I would remove Symantec/Norton, and replace with Microsoft Security essentials at least to test.
Download and run the Norton Removal Tool to uninstall your Norton product | Norton Support
Virus, Spyware & Malware Protection | Microsoft Security Essentials
These crsahes were Related to athrx.sys Extensible Wireless LAN device driver from Atheros Communications, Inc. I would re-install it with the newest driver available
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {10, 2, 0, fffff880014b95d6}
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ndis.sys -
Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrx.sys
*** ERROR: Module load completed but symbols could not be loaded for athrx.sys
Probably caused by : athrx.sys ( athrx+2e297 )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880014b95d6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e0
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisFreeTimerObject+16
fffff880`014b95d6 488b5310 mov rdx,qword ptr [rbx+10h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033548b0 -- (.trap 0xfffff880033548b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880014f0908
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014b95d6 rsp=fffff88003354a40 rbp=fffff800032785a0
r8=0000000000011120 r9=0000000000000000 r10=fffff80003063000
r11=fffffa8009de9030 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!NdisFreeTimerObject+0x16:
fffff880`014b95d6 488b5310 mov rdx,qword ptr [rbx+10h] ds:e040:00000000`00000010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d2c69 to fffff800030d3700
STACK_TEXT:
fffff880`03354768 fffff800`030d2c69 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03354770 fffff800`030d18e0 : fffffa80`07b27600 00000000`00000000 00000000`000007ff fffff800`031dd094 : nt!KiBugCheckDispatch+0x69
fffff880`033548b0 fffff880`014b95d6 : fffffa80`06d66040 fffff880`044c95e0 fffffa80`09dea440 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03354a40 fffff880`04439297 : fffffa80`09dea440 fffff880`0444f32f fffff880`0454e100 fffff880`0454e0f0 : ndis!NdisFreeTimerObject+0x16
fffff880`03354a70 fffffa80`09dea440 : fffff880`0444f32f fffff880`0454e100 fffff880`0454e0f0 00000000`00011120 : athrx+0x2e297
fffff880`03354a78 fffff880`0444f32f : fffff880`0454e100 fffff880`0454e0f0 00000000`00011120 fffff880`044394f3 : 0xfffffa80`09dea440
fffff880`03354a80 fffff880`0454e100 : fffff880`0454e0f0 00000000`00011120 fffff880`044394f3 fffffa80`09de92c0 : athrx+0x4432f
fffff880`03354a88 fffff880`0454e0f0 : 00000000`00011120 fffff880`044394f3 fffffa80`09de92c0 fffffa80`08ed0000 : athrx+0x143100
fffff880`03354a90 00000000`00011120 : fffff880`044394f3 fffffa80`09de92c0 fffffa80`08ed0000 fffffa80`08b9f050 : athrx+0x1430f0
fffff880`03354a98 fffff880`044394f3 : fffffa80`09de92c0 fffffa80`08ed0000 fffffa80`08b9f050 fffff880`0443c878 : 0x11120
fffff880`03354aa0 fffffa80`09de92c0 : fffffa80`08ed0000 fffffa80`08b9f050 fffff880`0443c878 fffffa80`08ed1030 : athrx+0x2e4f3
fffff880`03354aa8 fffffa80`08ed0000 : fffffa80`08b9f050 fffff880`0443c878 fffffa80`08ed1030 fffff880`0443c0c9 : 0xfffffa80`09de92c0
fffff880`03354ab0 fffffa80`08b9f050 : fffff880`0443c878 fffffa80`08ed1030 fffff880`0443c0c9 fffffa80`09de9030 : 0xfffffa80`08ed0000
fffff880`03354ab8 fffff880`0443c878 : fffffa80`08ed1030 fffff880`0443c0c9 fffffa80`09de9030 00000000`00000000 : 0xfffffa80`08b9f050
fffff880`03354ac0 fffffa80`08ed1030 : fffff880`0443c0c9 fffffa80`09de9030 00000000`00000000 00000000`00000000 : athrx+0x31878
fffff880`03354ac8 fffff880`0443c0c9 : fffffa80`09de9030 00000000`00000000 00000000`00000000 fffffa80`09de9000 : 0xfffffa80`08ed1030
fffff880`03354ad0 fffffa80`09de9030 : 00000000`00000000 00000000`00000000 fffffa80`09de9000 fffffa80`08c48e10 : athrx+0x310c9
fffff880`03354ad8 00000000`00000000 : 00000000`00000000 fffffa80`09de9000 fffffa80`08c48e10 fffff880`0443c069 : 0xfffffa80`09de9030
STACK_COMMAND: kb
FOLLOWUP_IP:
athrx+2e297
fffff880`04439297 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: athrx+2e297
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrx
IMAGE_NAME: athrx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a2997be
FAILURE_BUCKET_ID: X64_0xD1_athrx+2e297
BUCKET_ID: X64_0xD1_athrx+2e297
Followup: MachineOwner
---------