Network driver is failing ... but the driver is not old.
Try uninstalling AVG, at least as a test. Use Microsoft Security Essentials as your antivirus with windows inbuilt firewall, and free MBAM as the on demand scanner.
Download, install and update those, and then run full system scans with both of them, one by one.
Update JMicron JMB36X Controller driver, from ftp://driver.jmicron.com.tw/SATA_Controller/Windows/.
Let us know the results.
_______________________________________________________________________________________
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031f7123, fffff88007a4ce80, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+43 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031f7123, Address of the instruction which caused the bugcheck
Arg3: fffff88007a4ce80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`031f7123 418b45f0 mov eax,dword ptr [r13-10h]
CONTEXT: fffff88007a4ce80 -- (.cxr 0xfffff88007a4ce80)
rax=0000000000000000 rbx=fffffa800946a410 rcx=ff7ff8a003d00810
rdx=0000000000000000 rsi=fffffa8006a633f0 rdi=0000000000000000
rip=fffff800031f7123 rsp=fffff88007a4d860 rbp=0000000000000001
r8=0000000000000000 r9=fffff880009b3180 r10=fffffa8006a2d960
r11=fffffa80094ccd50 r12=0000000000000000 r13=ff7ff8a003d00810
r14=0000000005fdef00 r15=fffff8a003fbdd10
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExFreePoolWithTag+0x43:
fffff800`031f7123 418b45f0 mov eax,dword ptr [r13-10h] ds:002b:ff7ff8a0`03d00800=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031f7123
STACK_TEXT:
fffff880`07a4d860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x43
FOLLOWUP_IP:
nt!ExFreePoolWithTag+43
fffff800`031f7123 418b45f0 mov eax,dword ptr [r13-10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExFreePoolWithTag+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 51fb06cd
STACK_COMMAND: .cxr 0xfffff88007a4ce80 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+43
BUCKET_ID: X64_0x3B_nt!ExFreePoolWithTag+43
Followup: MachineOwner
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88007671028, fffff88007670880, fffff800030cd9c7}
Probably caused by : memory_corruption ( nt!MiReferenceControlAreaForCacheManager+167 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88007671028
Arg3: fffff88007670880
Arg4: fffff800030cd9c7
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88007671028 -- (.exr 0xfffff88007671028)
ExceptionAddress: fffff800030cd9c7 (nt!MiReferenceControlAreaForCacheManager+0x0000000000000167)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88007670880 -- (.cxr 0xfffff88007670880)
rax=fffffa800949e498 rbx=0000000000000001 rcx=ff7ffa8009479f18
rdx=0000000080000000 rsi=0000000000000000 rdi=fffffa800946a970
rip=fffff800030cd9c7 rsp=fffff88007671260 rbp=fffff80003254e80
r8=0000000000000000 r9=fffff80003254e80 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210246
nt!MiReferenceControlAreaForCacheManager+0x167:
fffff800`030cd9c7 48894108 mov qword ptr [rcx+8],rax ds:002b:ff7ffa80`09479f20=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003311100
GetUlongFromAddress: unable to read from fffff800033111c0
ffffffffffffffff
FOLLOWUP_IP:
nt!MiReferenceControlAreaForCacheManager+167
fffff800`030cd9c7 48894108 mov qword ptr [rcx+8],rax
FAULTING_IP:
nt!MiReferenceControlAreaForCacheManager+167
fffff800`030cd9c7 48894108 mov qword ptr [rcx+8],rax
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff800033d8ae0 to fffff800030cd9c7
STACK_TEXT:
fffff880`07671260 fffff800`033d8ae0 : 00000000`00000001 00000000`00000080 00000000`08000000 fffffa80`09640500 : nt!MiReferenceControlAreaForCacheManager+0x167
fffff880`076712c0 fffff800`030f2336 : fffffa80`06e8f4e8 00000000`00000000 00000000`00000000 fffff880`07671528 : nt!MmCreateSection+0x520
fffff880`076714c0 fffff880`0122b4d8 : fffff8a0`00000000 00000000`00000000 fffff8a0`0b19f800 fffff880`0127d088 : nt!CcInitializeCacheMap+0x746
fffff880`076715a0 fffff880`0122d0b3 : fffffa80`09850010 fffff8a0`0b19f803 fffff880`076717a0 fffffa80`0971bc80 : Ntfs!NtfsCachedRead+0x88
fffff880`07671600 fffff880`0122d478 : fffffa80`06fd9ad0 fffffa80`09850010 fffff880`07671701 fffffa80`09640500 : Ntfs!NtfsCommonRead+0x19ea
fffff880`07671770 fffff880`01163bcf : fffffa80`09850368 fffffa80`09850010 fffffa80`096405a0 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
fffff880`07671820 fffff880`011626df : fffffa80`07246de0 00000000`00000001 fffffa80`07246d00 fffffa80`09850010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`076718b0 fffff800`033e4a9b : 00000000`00000000 fffffa80`0971bc80 00000000`00000001 fffffa80`09850010 : fltmgr!FltpDispatch+0xcf
fffff880`07671910 fffff800`033c4783 : fffffa80`0971bc80 fffffa80`0971bc80 fffffa80`0971bc80 fffff800`03254e80 : nt!IopSynchronousServiceTail+0xfb
fffff880`07671980 fffff800`030d8e13 : 00000000`00000b14 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631
fffff880`07671a70 00000000`752f2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03a2edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x752f2e09
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiReferenceControlAreaForCacheManager+167
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 51fb06cd
STACK_COMMAND: .cxr 0xfffff88007670880 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x24_nt!MiReferenceControlAreaForCacheManager+167
BUCKET_ID: X64_0x24_nt!MiReferenceControlAreaForCacheManager+167
Followup: MachineOwner
---------