While I look at a your latest dmps can you do the following for us please;
Download then run Speccy (free) and post the resultant url for us, details here, this will provide us with information about your computer hardware + any software that you have installed that may explain the present issue/s.
Edit to add;
Your last crash dump points towards your AV software and the wireless device;
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800ec4f5c22, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!FlpReturnNetBufferListChain+8a262
fffff800`ec4f5c22 488b01 mov rax,qword ptr [rcx]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: ffffd000262d5210 -- (.trap 0xffffd000262d5210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0006cab1040 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe0006cab1040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800ec4f5c22 rsp=ffffd000262d53a0 rbp=0000000000000000
r8=ffffe0006cab1040 r9=0000000000000050 r10=ffffe0006cab1020
r11=ffffe0006cab15e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!FlpReturnNetBufferListChain+0x8a262:
fffff800`ec4f5c22 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801dbd652e9 to fffff801dbd5a760
STACK_TEXT:
ffffd000`262d50c8 fffff801`dbd652e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`262d50d0 fffff801`dbd63ac7 : ffffd000`00200202 ffffd000`262d6800 00000000`00000018 ffffd000`262d5350 : nt!KiBugCheckDispatch+0x69
ffffd000`262d5210 fffff800`ec4f5c22 : ffffd000`262d5500 ffffe000`75a661a0 00000000`00000000 00000000`fffff948 : nt!KiPageFault+0x247
ffffd000`262d53a0 fffff800`ec35128a : 00000000`00000000 00000000`00000001 fffff800`ec46b9c0 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0x8a262
ffffd000`262d53f0 fffff800`ec43c560 : 00000000`00000001 fffff801`dbc27000 ffffe000`6ced4a60 ffffd000`262d5559 : NETIO!NetioDereferenceNetBufferListChain+0xea
ffffd000`262d54c0 fffff800`ec43d818 : fffff800`ec5ac000 ffffe000`662d5130 00000000`00000001 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x4b0
ffffd000`262d55c0 fffff800`ec47e1ff : ffffe000`6c05b630 ffffe000`6ced4a60 ffffd000`262d5701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338
ffffd000`262d56e0 fffff800`ec47d85e : 00000000`00000002 ffffd000`00000001 fffff800`ec46b9c0 00000000`6ced4a01 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffd000`262d57c0 fffff801`dbc296f5 : 00000000`00000002 ffffe000`70206400 fffff800`ec47d790 ffffd000`262d5970 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce
ffffd000`262d58f0 fffff800`ec46bb46 : ffffe000`66182f30 00000000`00000006 ffffe000`66182cf0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`262d5940 fffff800`ec232d97 : ffffe000`6d5f6c10 ffffd000`262d5a30 00000000`00000001 ffffe000`6ced4a60 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`262d59c0 fffff800`ec232558 : ffffe000`6d5f6c10 ffffe000`6ced4a60 00000000`00000000 fffff800`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7
ffffd000`262d5a70 fffff800`ec23eef5 : ffffe000`68df61a0 ffffd000`00000001 ffffe000`68df61a0 fffff800`ee409e40 : ndis!ndisMTopReceiveNetBufferLists+0x318
ffffd000`262d5b70 fffff800`ec2414c3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x85
ffffd000`262d5bc0 fffff800`ec25e938 : 00000000`00000000 ffffe000`6c56dc70 ffffe000`6ced4a60 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x253
ffffd000`262d5c90 fffff800`ec23f0f4 : ffffe000`6c56dc70 00000000`00000001 ffffe000`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1fe18
ffffd000`262d5d30 fffff800`ef16c459 : ffffe000`6c433010 00000000`00000001 ffffe000`6ced4a60 ffffe000`6c4340e0 : ndis!NdisFIndicateReceiveNetBufferLists+0x54
ffffd000`262d5d70 fffff800`ec23eef5 : ffffe000`6c56b810 ffffd000`262d5f81 fffff800`ec252360 ffffd000`262d60e0 : nwifi!Pt6Receive+0x2b9
ffffd000`262d5dd0 fffff800`ec25239e : ffffe000`70206400 fffff801`dbc8938e 00000000`00000000 00000000`00001024 : ndis!ndisCallReceiveHandler+0x85
ffffd000`262d5e20 fffff801`dbc296f5 : ffffd000`262d5f81 ffffd000`262d5f68 00000000`00000001 fffff800`00000000 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffd000`262d5e70 fffff800`ec2552a1 : ffffe000`75a66030 00000000`00000000 ffffe000`6c56dc70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`262d5ec0 fffff800`ec24150a : 00000000`00000000 ffffc001`011d82f0 ffffd000`262d6260 00000000`000000a8 : ndis!ndisExpandStack+0x19
ffffd000`262d5f00 fffff800`ec25e938 : 00000000`00000000 ffffe000`6c56fc70 ffffe000`75a66030 fffff801`dbc80000 : ndis!ndisInvokeNextReceiveHandler+0x29a
ffffd000`262d5fd0 fffff800`ec23f0f4 : ffffe000`6c56fc70 ffffe000`75a66030 ffffe000`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1fe18
ffffd000`262d6070 fffff800`ee771a69 : ffffe000`6c56eca0 ffffe000`6c56e010 00000000`00000000 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x54
ffffd000`262d60b0 fffff800`ec23eef5 : ffffe000`6c56e010 ffffd000`262d62c1 fffff800`ec252360 fffff800`ec3641ff : vwififlt!FilterReceiveNetBufferLists+0x119
ffffd000`262d6110 fffff800`ec25239e : ffffe000`70206400 fffff800`ec6614c2 ffffe000`6b60c8d0 ffffe000`75a66030 : ndis!ndisCallReceiveHandler+0x85
ffffd000`262d6160 fffff801`dbc296f5 : ffffd000`262d62c1 ffffd000`262d62a8 00000000`00000001 00000000`00000004 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffd000`262d61b0 fffff800`ec2552a1 : ffffe000`75a66030 00000000`00000000 ffffe000`6c56fc70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`262d6200 fffff800`ec24150a : ffffe000`6c7844e0 00000000`00000000 fffff800`ef5a28f0 ffffe000`00000000 : ndis!ndisExpandStack+0x19
ffffd000`262d6240 fffff800`ec25e938 : 00000000`00000000 ffffe000`6c575800 ffffe000`75a66030 ffffd000`262d6389 : ndis!ndisInvokeNextReceiveHandler+0x29a
ffffd000`262d6310 fffff800`ec23f0f4 : ffffe000`6c575800 00000000`00000001 ffffe000`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1fe18
ffffd000`262d63b0 fffff800`ec6d1167 : 00000000`00000000 ffffd000`262d64f0 00000000`00000001 ffffe000`6c570ab0 : ndis!NdisFIndicateReceiveNetBufferLists+0x54
ffffd000`262d63f0 fffff800`ec23eef5 : 00000000`00000000 00000000`00000001 00000000`00000000 ffffe000`71bebb68 : wfplwfs!LwfLowerRecvNetBufferLists+0x167
ffffd000`262d6550 fffff800`ec25239e : ffffe000`70206400 ffffe000`7049df00 ffffe000`71beb9d8 fffff800`ec0c51ee : ndis!ndisCallReceiveHandler+0x85
ffffd000`262d65a0 fffff801`dbc296f5 : ffffd000`262d6780 ffffd000`262d6758 ffffe000`75a66030 00000000`00000000 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffd000`262d65f0 fffff800`ec2552a1 : 00000000`014fb4da 00000000`00000000 ffffe000`6c575800 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85
ffffd000`262d6640 fffff800`ec233db9 : 00000000`00000000 ffffd000`262d6780 00000000`00000000 ffffc001`2ab21660 : ndis!ndisExpandStack+0x19
ffffd000`262d6680 fffff800`f0eeab54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x3e9
ffffd000`262d6800 fffff800`f0eaa654 : 00000000`00000000 ffffe000`69f13690 ffffe000`69973910 ffffe000`69f10000 : wdiwifi!CPort::IndicateFrames+0xd8
ffffd000`262d6860 fffff800`f0ea9ac6 : 00000000`00000000 ffffd000`262d6969 ffffe000`69f13690 ffffe000`69f13690 : wdiwifi!CRxMgr::RxIndicatePortFrames+0x110
ffffd000`262d68c0 fffff800`f0eaae2a : 00000000`00000000 ffffe000`70206540 ffffe000`69f13690 00000000`00000000 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x702
ffffd000`262d69d0 fffff801`dbc9eb50 : ffffe000`65e28b90 ffffe000`68df6050 00000000`00000000 00000000`00000000 : wdiwifi!RxMgrWorkItemRoutine+0x6a
ffffd000`262d6a10 fffff801`dbc696a9 : fffff801`dbfab200 ffffe000`70206400 fffff801`dbc9ea60 00000001`d54b5705 : nt!IopProcessWorkItem+0xf0
ffffd000`262d6a80 fffff801`dbcfb895 : 00000000`00000000 00000000`00000080 ffffe000`63eba680 ffffe000`70206400 : nt!ExpWorkerThread+0xe9
ffffd000`262d6b10 fffff801`dbd5f906 : ffffd000`5b2df180 ffffe000`70206400 fffff801`dbcfb854 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffd000`262d6b60 00000000`00000000 : ffffd000`262d7000 ffffd000`262d0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferListChain+ea
fffff800`ec35128a 418bc4 mov eax,r12d
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+ea
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5632d715
FAILURE_BUCKET_ID: X64_AV_NETIO!NetioDereferenceNetBufferListChain+ea
BUCKET_ID: X64_AV_NETIO!NetioDereferenceNetBufferListChain+ea
Your penultimate crash dumps also points towards the same;
FAILURE_BUCKET_ID: X64_AV_nwifi!Pt6Receive+2b9
BUCKET_ID: X64_AV_nwifi!Pt6Receive+2b9
Need to wait on the Speccy url for now.