Here is Bugcheck Analysis from Texas Instruments Technical Support:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa8055a00018, 2, 0, fffff8800ae2ecb1}
*** WARNING: Unable to verify timestamp for VirusUSB.sys
*** ERROR: Module load completed but symbols could not be loaded for VirusUSB.sys
*** WARNING: Unable to verify timestamp for tihub3.sys
*** ERROR: Module load completed but symbols could not be loaded for tihub3.sys
Probably caused by : VirusUSB.sys ( VirusUSB+2ecb1 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8055a00018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800ae2ecb1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b8100
GetUlongFromAddress: unable to read from fffff800032b81c0
fffffa8055a00018 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
VirusUSB+2ecb1
fffff880`0ae2ecb1 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9456.0 (debuggers(dbg).130703-2335) x86fre
TRAP_FRAME: fffff88006bfe450 -- (.trap 0xfffff88006bfe450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80200a5c60 rbx=0000000000000000 rcx=fffffa801f6c6270
rdx=0000000036339da0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800ae2ecb1 rsp=fffff88006bfe5e0 rbp=0000000000000000
r8=fffffa801fc33650 r9=0000000000000030 r10=fffff8000300b000
r11=fffff88006bfe728 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
VirusUSB+0x2ecb1:
fffff880`0ae2ecb1 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030801a9 to fffff80003080c00
STACK_TEXT:
fffff880`06bfe308 fffff800`030801a9 : 00000000`0000000a fffffa80`55a00018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06bfe310 fffff800`0307ee20 : fffffa80`200a5e9b fffffa80`200a5c60 fffffa80`200a5c60 fffffa80`200a5e9b : nt!KiBugCheckDispatch+0x69
fffff880`06bfe450 fffff880`0ae2ecb1 : fffff880`01b19ced fffff880`06bfe630 fffff880`0a33e890 fffff880`0ae2fd9c : nt!KiPageFault+0x260
fffff880`06bfe5e0 fffff880`01b19ced : fffff880`06bfe630 fffff880`0a33e890 fffff880`0ae2fd9c fffffa80`20e073b0 : VirusUSB+0x2ecb1
fffff880`06bfe5e8 fffff880`06bfe630 : fffff880`0a33e890 fffff880`0ae2fd9c fffffa80`20e073b0 fffffa80`200a5c60 : cng!g_AesCtrSafeCtx <PERF> (cng+0x6aced)
fffff880`06bfe5f0 fffff880`0a33e890 : fffff880`0ae2fd9c fffffa80`20e073b0 fffffa80`200a5c60 fffff880`0a350940 : 0xfffff880`06bfe630
fffff880`06bfe5f8 fffff880`0ae2fd9c : fffffa80`20e073b0 fffffa80`200a5c60 fffff880`0a350940 fffff880`06bfe798 : tihub3+0x45890
fffff880`06bfe600 fffffa80`20e073b0 : fffffa80`200a5c60 fffff880`0a350940 fffff880`06bfe798 fffffa80`20e07370 : VirusUSB+0x2fd9c
fffff880`06bfe608 fffffa80`200a5c60 : fffff880`0a350940 fffff880`06bfe798 fffffa80`20e07370 fffffa80`1fc33650 : 0xfffffa80`20e073b0
fffff880`06bfe610 fffff880`0a350940 : fffff880`06bfe798 fffffa80`20e07370 fffffa80`1fc33650 00000000`00000000 : 0xfffffa80`200a5c60
fffff880`06bfe618 fffff880`06bfe798 : fffffa80`20e07370 fffffa80`1fc33650 00000000`00000000 fffff800`030845c1 : tihub3+0x57940
fffff880`06bfe620 fffffa80`20e07370 : fffffa80`1fc33650 00000000`00000000 fffff800`030845c1 00000000`00000000 : 0xfffff880`06bfe798
fffff880`06bfe628 fffffa80`1fc33650 : 00000000`00000000 fffff800`030845c1 00000000`00000000 fffffa80`200a5c60 : 0xfffffa80`20e07370
fffff880`06bfe630 00000000`00000000 : fffff800`030845c1 00000000`00000000 fffffa80`200a5c60 fffffa80`1fc33650 : 0xfffffa80`1fc33650
STACK_COMMAND: kb
FOLLOWUP_IP:
VirusUSB+2ecb1
fffff880`0ae2ecb1 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: VirusUSB+2ecb1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: VirusUSB
IMAGE_NAME: VirusUSB.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50116785
FAILURE_BUCKET_ID: X64_0xD1_VirusUSB+2ecb1
BUCKET_ID: X64_0xD1_VirusUSB+2ecb1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_virususb+2ecb1
FAILURE_ID_HASH: {62c24f18-58b4-2dd6-4fd1-2e115a2e25ad}
Followup: MachineOwner