Hi, I have an 8265 wifi adapter. I experience BSOD's randomly on system boot up, maybe every 2- 3 or so. I see this same topic in earlier posts where someone had the same issue then stated it was resolved,
Here is the debug of mini dump file. It is flagging the Netwtw06.sys file as the probable cause.
Microsoft (R) Windows Debugger Version 10.0.16299.91 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 16299 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff801`d2c9c000 PsLoadedModuleList = 0xfffff801`d3002fd0
Debug session time: Sun Jan 7 16:10:30.213 2018 (UTC + 3:00)
System Uptime: 0 days 4:36:23.158
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffff960631a00000, 2, fffff801d2e2566f, 2}
*** WARNING: Unable to verify timestamp for Netwtw06.sys
*** ERROR: Module load completed but symbols could not be loaded for Netwtw06.sys
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : Netwtw06.sys ( Netwtw06+531eb9 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff960631a00000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff801d2e2566f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.16299.192 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: Timi
SYSTEM_PRODUCT_NAME: TM1701
BIOS_VENDOR: INSYDE Corp.
BIOS_VERSION: XMAKB5R0P0200
BIOS_DATE: 09/07/2017
BASEBOARD_MANUFACTURER: Timi
BASEBOARD_PRODUCT: TM1701
BASEBOARD_VERSION: MP
DUMP_TYPE: 2
BUGCHECK_P1: ffff960631a00000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff801d2e2566f
BUGCHECK_P4: 2
READ_ADDRESS: fffff801d3098380: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff960631a00000
FAULTING_IP:
nt!memcpy+af
fffff801`d2e2566f 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: 708
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 8e
CPU_STEPPING: a
CPU_MICROCODE: 6,8e,a,0 (F,M,S,R) SIG: 70'00000000 (cache) 70'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-9J1D3C6
ANALYSIS_SESSION_TIME: 01-07-2018 16:36:07.0613
ANALYSIS_VERSION: 10.0.16299.91 amd64fre
TRAP_FRAME: ffffb008f7dced90 -- (.trap 0xffffb008f7dced90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000040000 rbx=0000000000000000 rcx=ffff960631a00020
rdx=00001dfb99dc0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801d2e2566f rsp=ffffb008f7dcef28 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000800 r10=00000000ffffffff
r11=ffff960631a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memcpy+0xaf:
fffff801`d2e2566f 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0 ds:ffff9606`31a00000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801d2e3b71d to fffff801d2e116e0
STACK_TEXT:
ffffb008`f7dceb18 fffff801`d2e3b71d : 00000000`00000050 ffff9606`31a00000 00000000`00000002 ffffb008`f7dced90 : nt!KeBugCheckEx
ffffb008`f7dceb20 fffff801`d2cebbbd : 00000000`00000002 ffff9606`31a00000 ffffb008`f7dced90 ffffb008`f7dcecc0 : nt!MiSystemFault+0x15151d
ffffb008`f7dcebc0 fffff801`d2e2074e : 00000000`00000000 ffffac80`03f95850 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x23d
ffffb008`f7dced90 fffff801`d2e2566f : fffff801`d313a48a 00000000`00000000 ffff9606`2a230830 ffff9606`31a00000 : nt!KiPageFault+0x40e
ffffb008`f7dcef28 fffff801`d313a48a : 00000000`00000000 ffff9606`2a230830 ffff9606`31a00000 ffff9606`2c6e34e0 : nt!memcpy+0xaf
ffffb008`f7dcef30 fffff801`d313a214 : 00000000`00040000 00000000`00040000 00000000`00c89848 ffffb008`f7dcf030 : nt!CcCopyBytesToUserBuffer+0x4a
ffffb008`f7dcef80 fffff801`d2cd2cbc : ffff9606`275c8260 00000000`00000000 00000000`00040000 ffff9606`29e58701 : nt!CcMapAndCopyFromCache+0x114
ffffb008`f7dcf020 fffff80c`3ceb25ee : ffff8502`00000000 ffff8502`00000000 ffff9606`00c89848 ffff8502`00000000 : nt!CcCopyReadEx+0x12c
ffffb008`f7dcf0b0 fffff80c`3ceb4dff : 00000000`00c89848 ffffb008`f7dcf350 ffff8502`d4653bf0 ffff8502`d4653c48 : NTFS!NtfsCachedRead+0x182
ffffb008`f7dcf120 fffff80c`3ceb29b8 : ffff9606`303f0558 ffff9606`2b6a3010 00000000`00000064 ffff8502`d4653bf0 : NTFS!NtfsCommonRead+0x224f
ffffb008`f7dcf320 fffff801`d2cb62d9 : ffff9606`304b4c00 ffff9606`2b6a3010 00000000`00000000 ffff9606`2b6a3440 : NTFS!NtfsFsdRead+0x1d8
ffffb008`f7dcf3e0 fffff80c`3ba08773 : ffff9606`2b6a3010 ffffb008`f7dcf4c0 ffffb008`f7dcf4d9 00000000`00000000 : nt!IofCallDriver+0x59
ffffb008`f7dcf420 fffff80c`3ba06db6 : ffffb008`f7dcf4b0 ffffc562`b15b5f10 ffff9606`28349b01 fffff801`d2d5c0c5 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a3
ffffb008`f7dcf490 fffff801`d2cb62d9 : ffff9606`2b6a3010 fffff801`d3136440 ffffaf80`00009040 00000000`00103100 : FLTMGR!FltpDispatch+0xb6
ffffb008`f7dcf4f0 fffff801`d3115efe : 00000000`00000000 ffff9606`2c6e34e0 ffff9606`2b6a3488 fffff801`d30b3200 : nt!IofCallDriver+0x59
ffffb008`f7dcf530 fffff801`d31168fa : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb008`f7dcf7c0 : nt!IopSynchronousServiceTail+0x19e
ffffb008`f7dcf5e0 fffff801`d2e24203 : 00000000`00000300 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x68a
ffffb008`f7dcf6d0 fffff801`d2e15100 : fffff80c`3ef71eb9 fffff80c`3ee242c8 fffff80c`3ee24270 fffff80c`3ee24330 : nt!KiSystemServiceCopyEnd+0x13
ffffb008`f7dcf8d8 fffff80c`3ef71eb9 : fffff80c`3ee242c8 fffff80c`3ee24270 fffff80c`3ee24330 fffff80c`3ee24300 : nt!KiServiceLinkage
ffffb008`f7dcf8e0 fffff80c`3ee242c8 : fffff80c`3ee24270 fffff80c`3ee24330 fffff80c`3ee24300 ffffb008`f7dcf930 : Netwtw06+0x531eb9
ffffb008`f7dcf8e8 fffff80c`3ee24270 : fffff80c`3ee24330 fffff80c`3ee24300 ffffb008`f7dcf930 ffff9606`31a00000 : Netwtw06+0x3e42c8
ffffb008`f7dcf8f0 fffff80c`3ee24330 : fffff80c`3ee24300 ffffb008`f7dcf930 ffff9606`31a00000 fffff801`00c89848 : Netwtw06+0x3e4270
ffffb008`f7dcf8f8 fffff80c`3ee24300 : ffffb008`f7dcf930 ffff9606`31a00000 fffff801`00c89848 00000000`00000000 : Netwtw06+0x3e4330
ffffb008`f7dcf900 ffffb008`f7dcf930 : ffff9606`31a00000 fffff801`00c89848 00000000`00000000 00000000`00000000 : Netwtw06+0x3e4300
ffffb008`f7dcf908 ffff9606`31a00000 : fffff801`00c89848 00000000`00000000 00000000`00000000 00000000`00000240 : 0xffffb008`f7dcf930
ffffb008`f7dcf910 fffff801`00c89848 : 00000000`00000000 00000000`00000000 00000000`00000240 00000000`00000000 : 0xffff9606`31a00000
ffffb008`f7dcf918 00000000`00000000 : 00000000`00000000 00000000`00000240 00000000`00000000 00000000`00000018 : 0xfffff801`00c89848
THREAD_SHA1_HASH_MOD_FUNC: 3d6cde47e773f16403bbc07451cb0ace9284a31c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ed0efe6e78434f104d261aa9ca0339c46a8eb59f
THREAD_SHA1_HASH_MOD: a748b77ec3bc3a3a63336300a46c45387f2d3225
FOLLOWUP_IP:
Netwtw06+531eb9
fffff80c`3ef71eb9 33d2 xor edx,edx
FAULT_INSTR_CODE: 4489d233
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: Netwtw06+531eb9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 59fb46b2
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 531eb9
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!unknown_function
BUCKET_ID: AV_INVALID_Netwtw06!unknown_function
PRIMARY_PROBLEM_CLASS: AV_INVALID_Netwtw06!unknown_function
TARGET_TIME: 2018-01-07T13:10:30.000Z
OSBUILD: 16299
OSSERVICEPACK: 192
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-01-01 14:07:05
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.192
ANALYSIS_SESSION_ELAPSED_TIME: 2037
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_netwtw06!unknown_function
FAILURE_ID_HASH: {2101a6f1-56d4-96a1-954f-0b4ab4996965}
Followup: MachineOwner
---------