The first crash was caused by a problem between Avast and Discord, the second only flags up a system driver along with the driver NETIO.SYS which is related to the Network I/O Subsystem, this could also be caused by a problem between Avast and your network connection.
Try updating your network drivers, make sure that Windows is fully up to date and uninstall Avast, see my canned info below;
Windows 8, 8.1 and 10 come with an improved Windows Defender, it offers the same real-time anti-virus/anti-malware protection as Microsoft Security Essentials. Windows Defender also shares the same malware signature definitions as Microsoft Security Essentials, and Forefront Endpoint Protection. Technically, Microsoft Security Essentials has not been renamed Windows Defender, or combined with it in Windows 8, 8.1 and 10.
Having more than one AV installed on your computer is bad, it will slow down the computer, cause internet connection problems and leave you with no AV protection at all if they cancel each other out as they fight for resources.
If any AV product that you have is a paid for version you should always make sure that you have a copy of the product key kept somewhere safe just in case you ever wish to reinstall it.
Avast clean removal info
here
If you stick with only Windows Defender, once any other AV has been correctly uninstalled, check to see if Windows Defender has auto enabled and allow it to update and carry out a full scan of your computer.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013266ce90, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!MI_READ_PTE_LOCK_FREE+0
fffff801`3266ce90 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: AV
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffff8e06daa8a260 -- (.trap 0xffff8e06daa8a260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013266ce90 rsp=ffff8e06daa8a3f8 rbp=7fffffffffffffff
r8=ffffb4da6d369000 r9=ffffb48000009140 r10=ffff920ead0f0980
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff801`3266ce90 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff801327d3c69 to fffff801327c30a0
STACK_TEXT:
ffff8e06`daa8a118 fffff801`327d3c69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8e06`daa8a120 fffff801`327d08e5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8e06`daa8a260 fffff801`3266ce90 : fffff801`3275c951 00000000`00000001 00000000`00000000 ffff2f1f`84605a96 : nt!KiPageFault+0x425
ffff8e06`daa8a3f8 fffff801`3275c951 : 00000000`00000001 00000000`00000000 ffff2f1f`84605a96 00000000`00000000 : nt!MI_READ_PTE_LOCK_FREE
ffff8e06`daa8a400 fffff801`3267a901 : 00000000`00000000 fffff801`3266e4b1 ffff920e`ad0f0980 ffffb480`00009140 : nt!MiCaptureProtectionFromLockedProto+0x29
ffff8e06`daa8a430 fffff801`326778b4 : 00000000`01228000 00000000`00002c00 00000000`00000001 ffff920e`adfa7a80 : nt!MiGetPageProtection+0x551
ffff8e06`daa8a4a0 fffff801`326e63a6 : 00000000`03a9c000 00000000`01200000 ffff920e`ad0f0980 0a000000`1c8da121 : nt!MiQueryAddressState+0x414
ffff8e06`daa8a690 fffff801`32b1a1b6 : ffff8e06`00000006 00000000`00000003 ffff8e06`00000000 00000000`00000003 : nt!MiQueryAddressSpan+0x126
ffff8e06`daa8a730 fffff801`32b19a51 : ffff8e06`daa8aa00 ffffb480`003b97c8 ffffb4da`40001dc8 ffffb4da`6d200008 : nt!MmQueryVirtualMemory+0x756
ffff8e06`daa8a8d0 fffff80a`2dedd398 : ffff920e`a7558700 ffff8e06`daa8aa80 00000000`00000000 00000000`03caa000 : nt!NtQueryVirtualMemory+0x25
ffff8e06`daa8a920 ffff920e`a7558700 : ffff8e06`daa8aa80 00000000`00000000 00000000`03caa000 00000000`00000030 : aswSnx+0x2d398
ffff8e06`daa8a928 ffff8e06`daa8aa80 : 00000000`00000000 00000000`03caa000 00000000`00000030 00000000`0909e458 : 0xffff920e`a7558700
ffff8e06`daa8a930 00000000`00000000 : 00000000`03caa000 00000000`00000030 00000000`0909e458 00000000`00000000 : 0xffff8e06`daa8aa80
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSnx+2d398
fffff80a`2dedd398 448be0 mov r12d,eax
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: aswSnx+2d398
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSnx
IMAGE_NAME: aswSnx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5bdc3b02
FAILURE_BUCKET_ID: X64_AV_VRF_aswSnx+2d398
BUCKET_ID: X64_AV_VRF_aswSnx+2d398
Followup: MachineOwner