I had to re-image my computer and now I have been getting this BSOD lately. It happens at random intervals sometimes when gaming but other times when just surfing the web. I have run memtest 86 as well as windows memory test and also check disk with no problems. I have tried different video drivers and changing overclocks etc. The system was stable at the exact clock its running at now for over a year so why this is happening now does not make sense. I clocked back my ram and HT but that still did not help. Here is the latest memory dump it seems to refer to a usb port?? Why would this be causing a bsod??
System:
Vista Ultimate 64-Bit
AMD Athlon 64 X2 4800+ (2.7Ghz)
4GB DDR400 OCZ EL Platinum 2-2-2-5
2x EVGA 8800GT SLI
3x WD Caviar SE16 250GB SATA Raid0
Auzentech X-FI Prelude
Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Executable search path is:
Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c1fdb0
Debug session time: Fri Nov 14 23:50:45.922 2008 (GMT-7)
System Uptime: 0 days 3:11:27.388
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
*Bugcheck Analysis*
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffae003011055, 2, 8, fffffae003011055}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_ReferenceEndpoint+55 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*Bugcheck Analysis*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffae003011055, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffffae003011055, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002c83080
fffffae003011055
CURRENT_IRQL: 2
FAULTING_IP:
+fffffae003011055
fffffae0`03011055 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ra3_1.3.game
TRAP_FRAME: fffff80003c3f500 -- (.trap 0xfffff80003c3f500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000002b4c7874 rbx=fffffa8004f6a050 rcx=fffffa8004f6a1a0
rdx=000000004f444648 rsi=fffffa8007f87bc8 rdi=fffffa8005dd46d8
rip=fffffae003011055 rsp=fffff80003c3f690 rbp=0000000000000000
r8=000000004f444648 r9=fffffa8007f87a60 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffffae0`03011055 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002aaf0ee to fffff80002aaf350
FAILED_INSTRUCTION_ADDRESS:
+fffffae003011055
fffffae0`03011055 ?? ???
STACK_TEXT:
fffff800`03c3f3b8 fffff800`02aaf0ee : 00000000`0000000a fffffae0`03011055 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`03c3f3c0 fffff800`02aadfcb : 00000000`00000008 fffffa80`05e2c060 0000057f`f85d6f00 fffff800`03c3f6f0 : nt!KiBugCheckDispatch+0x6e
fffff800`03c3f500 fffffae0`03011055 : 00000000`00000388 00000000`00000001 fffffa80`07f87bc8 fffffa60`03012781 : nt!KiPageFault+0x20b
fffff800`03c3f690 00000000`00000388 : 00000000`00000001 fffffa80`07f87bc8 fffffa60`03012781 fffff800`03c3f730 : 0xfffffae0`03011055
fffff800`03c3f698 00000000`00000001 : fffffa80`07f87bc8 fffffa60`03012781 fffff800`03c3f730 fffffa60`0301ec01 : 0x388
fffff800`03c3f6a0 fffffa80`07f87bc8 : fffffa60`03012781 fffff800`03c3f730 fffffa60`0301ec01 fffffa80`04f6a050 : 0x1
fffff800`03c3f6a8 fffffa60`03012781 : fffff800`03c3f730 fffffa60`0301ec01 fffffa80`04f6a050 fffffa60`0300b045 : 0xfffffa80`07f87bc8
fffff800`03c3f6b0 fffffa60`2b4c7874 : fffffa80`04f6a4a0 fffffa80`07f87c50 fffffa80`04f6a1a0 fffffa80`06238010 : USBPORT!USBPORT_ReferenceEndpoint+0x55
fffff800`03c3f700 fffffa80`04f6a4a0 : fffffa80`07f87c50 fffffa80`04f6a1a0 fffffa80`06238010 fffffa80`04f6a050 : 0xfffffa60`2b4c7874
fffff800`03c3f708 fffffa80`07f87c50 : fffffa80`04f6a1a0 fffffa80`06238010 fffffa80`04f6a050 fffffa60`03021f81 : 0xfffffa80`04f6a4a0
fffff800`03c3f710 fffffa80`04f6a1a0 : fffffa80`06238010 fffffa80`04f6a050 fffffa60`03021f81 fffffa80`07f87a60 : 0xfffffa80`07f87c50
fffff800`03c3f718 fffffa80`06238010 : fffffa80`04f6a050 fffffa60`03021f81 fffffa80`07f87a60 fffffa80`07f87a60 : 0xfffffa80`04f6a1a0
fffff800`03c3f720 fffffa80`04f6a050 : fffffa60`03021f81 fffffa80`07f87a60 fffffa80`07f87a60 fffffa80`079e3010 : 0xfffffa80`06238010
fffff800`03c3f728 fffffa60`03021f81 : fffffa80`07f87a60 fffffa80`07f87a60 fffffa80`079e3010 fffffa80`05dbab80 : 0xfffffa80`04f6a050
fffff800`03c3f730 fffffa60`03037007 : fffffa80`079e3010 fffffa80`52547571 fffffa80`079e3010 00000000`80000300 : USBPORT!USBPORT_Core_QueueTransferUrb+0x1a9
fffff800`03c3f770 fffffa60`030369e1 : fffffa80`04f6a1a0 fffffa80`52546c61 fffffa80`079e64f0 fffffa80`06238010 : USBPORT!USBPORT_AsyncTransfer+0x8f
fffff800`03c3f7a0 fffffa60`0303e6d2 : fffffa80`0636c050 fffffa80`04f6a050 fffffa80`06238010 fffffa80`06360009 : USBPORT!USBPORT_ProcessURB+0x9d1
fffff800`03c3f880 fffffa60`0300f662 : fffffa80`06238010 fffffa80`06238248 fffffa80`052b45c0 00000000`00000000 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x1ea
fffff800`03c3f8d0 fffffa60`03c5f134 : fffffa80`06450050 fffffa80`0797c060 fffffa80`06238010 fffffa80`0797c1b0 : USBPORT!USBPORT_Dispatch+0x396
fffff800`03c3f940 fffffa60`03c8accd : 00000000`00000000 00000000`00000000 fffffa80`0797c060 00000000`00000002 : usbhub!UsbhFdoUrbPdoFilter+0xe0
fffff800`03c3f970 fffffa60`03c5dbc7 : fffffa80`07a131b8 fffffa80`079cdb88 00000000`00000000 fffffa80`06238010 : usbhub!UsbhPdoInternalDeviceControl+0x375
fffff800`03c3f9c0 fffffa60`089a8d83 : fffffa80`079cdb88 00000000`00220003 fffffa80`06238010 00000000`00000324 : usbhub!UsbhGenDispatch+0x57
fffff800`03c3fa00 fffffa60`089a5484 : fffffa80`07a131b8 00000000`00000000 fffffa80`079cdb88 fffffa80`06238010 : usbccgp!UsbcForwardIrp+0x87
fffff800`03c3fa50 fffffa60`089a573a : fffffa80`07a131b8 00000000`00220003 fffffa80`06238010 fffffa80`079cdb88 : usbccgp!DispatchPdoUrb+0x108
fffff800`03c3fa90 fffffa60`089a3695 : fffffa80`07a131b8 fffffa80`079cdb88 fffffa80`07a131b0 fffffa80`06238010 : usbccgp!DispatchPdoInternalDeviceControl+0x18a
fffff800`03c3fad0 fffffa60`089c17c0 : fffffa80`07a13060 00000000`00000001 fffffa80`079b2000 fffffa80`06238010 : usbccgp!USBC_Dispatch+0x269
fffff800`03c3fb40 fffffa60`089c13b9 : fffffa80`079b2060 00000000`00000000 fffff800`03c3fbe0 fffffa80`06238010 : hidusb!HumReadReport+0x138
fffff800`03c3fb90 fffffa60`089cc173 : fffffa80`0798bc01 00000000`00000000 fffffa80`0798bcf0 fffffa80`079b21d0 : hidusb!HumInternalIoctl+0x99
fffff800`03c3fbe0 fffffa60`089cc69c : fffffa80`0798bcf0 00000000`00000000 00000000`00000008 00000000`00000000 : HIDCLASS!HidpSubmitInterruptRead+0xa7
fffff800`03c3fc20 fffff800`02ab16c5 : fffffa80`06238010 fffffa80`05dbab00 fffffa80`04f6b301 00000000`00000000 : HIDCLASS!HidpInterruptReadComplete+0x218
fffff800`03c3fc90 fffffa60`03022d68 : fffffa80`04f6a050 fffffa80`04f6a000 fffffa80`04f6a1a0 fffffa80`04f6a050 : nt!IopfCompleteRequest+0x315
fffff800`03c3fd50 fffffa60`03023420 : fffffa80`54546b63 fffffa80`06238010 fffff800`32466d64 fffffa80`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x898
fffff800`03c3fe30 fffffa60`03020872 : fffffa80`39585043 fffffa80`04f6a1a0 fffffa80`04f6b088 fffffa80`04f6a1a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x514
fffff800`03c3fea0 fffffa60`0300d18b : fffffa80`31636f49 fffffa80`04f6b088 fffffa60`11c0cc02 fffffa80`04f6a1a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a
fffff800`03c3fef0 fffff800`02ab89d7 : fffffa80`04f6b0a0 fffffa60`34776478 fffffa60`11c0cca0 fffff800`02bd1a80 : USBPORT!USBPORT_Xdpc_Worker+0x26f
fffff800`03c3ff40 fffff800`02ab2825 : fffffa60`0300cf1c fffff800`02bce680 fffffa60`11c0cca0 fffffa80`04b51c00 : nt!KiRetireDpcList+0x117
fffff800`03c3ffb0 fffff800`02ab2637 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffffa60`11c0cbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_ReferenceEndpoint+55
fffffa60`03012781 488b6c2458 mov rbp,qword ptr [rsp+58h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: USBPORT!USBPORT_ReferenceEndpoint+55
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 479199d8
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_USBPORT!USBPORT_ReferenceEndpoint+55
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_USBPORT!USBPORT_ReferenceEndpoint+55
Followup: MachineOwner
---------
System:
Vista Ultimate 64-Bit
AMD Athlon 64 X2 4800+ (2.7Ghz)
4GB DDR400 OCZ EL Platinum 2-2-2-5
2x EVGA 8800GT SLI
3x WD Caviar SE16 250GB SATA Raid0
Auzentech X-FI Prelude
Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Executable search path is:
Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c1fdb0
Debug session time: Fri Nov 14 23:50:45.922 2008 (GMT-7)
System Uptime: 0 days 3:11:27.388
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
*Bugcheck Analysis*
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffae003011055, 2, 8, fffffae003011055}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_ReferenceEndpoint+55 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*Bugcheck Analysis*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffae003011055, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffffae003011055, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002c83080
fffffae003011055
CURRENT_IRQL: 2
FAULTING_IP:
+fffffae003011055
fffffae0`03011055 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ra3_1.3.game
TRAP_FRAME: fffff80003c3f500 -- (.trap 0xfffff80003c3f500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000002b4c7874 rbx=fffffa8004f6a050 rcx=fffffa8004f6a1a0
rdx=000000004f444648 rsi=fffffa8007f87bc8 rdi=fffffa8005dd46d8
rip=fffffae003011055 rsp=fffff80003c3f690 rbp=0000000000000000
r8=000000004f444648 r9=fffffa8007f87a60 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffffae0`03011055 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002aaf0ee to fffff80002aaf350
FAILED_INSTRUCTION_ADDRESS:
+fffffae003011055
fffffae0`03011055 ?? ???
STACK_TEXT:
fffff800`03c3f3b8 fffff800`02aaf0ee : 00000000`0000000a fffffae0`03011055 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`03c3f3c0 fffff800`02aadfcb : 00000000`00000008 fffffa80`05e2c060 0000057f`f85d6f00 fffff800`03c3f6f0 : nt!KiBugCheckDispatch+0x6e
fffff800`03c3f500 fffffae0`03011055 : 00000000`00000388 00000000`00000001 fffffa80`07f87bc8 fffffa60`03012781 : nt!KiPageFault+0x20b
fffff800`03c3f690 00000000`00000388 : 00000000`00000001 fffffa80`07f87bc8 fffffa60`03012781 fffff800`03c3f730 : 0xfffffae0`03011055
fffff800`03c3f698 00000000`00000001 : fffffa80`07f87bc8 fffffa60`03012781 fffff800`03c3f730 fffffa60`0301ec01 : 0x388
fffff800`03c3f6a0 fffffa80`07f87bc8 : fffffa60`03012781 fffff800`03c3f730 fffffa60`0301ec01 fffffa80`04f6a050 : 0x1
fffff800`03c3f6a8 fffffa60`03012781 : fffff800`03c3f730 fffffa60`0301ec01 fffffa80`04f6a050 fffffa60`0300b045 : 0xfffffa80`07f87bc8
fffff800`03c3f6b0 fffffa60`2b4c7874 : fffffa80`04f6a4a0 fffffa80`07f87c50 fffffa80`04f6a1a0 fffffa80`06238010 : USBPORT!USBPORT_ReferenceEndpoint+0x55
fffff800`03c3f700 fffffa80`04f6a4a0 : fffffa80`07f87c50 fffffa80`04f6a1a0 fffffa80`06238010 fffffa80`04f6a050 : 0xfffffa60`2b4c7874
fffff800`03c3f708 fffffa80`07f87c50 : fffffa80`04f6a1a0 fffffa80`06238010 fffffa80`04f6a050 fffffa60`03021f81 : 0xfffffa80`04f6a4a0
fffff800`03c3f710 fffffa80`04f6a1a0 : fffffa80`06238010 fffffa80`04f6a050 fffffa60`03021f81 fffffa80`07f87a60 : 0xfffffa80`07f87c50
fffff800`03c3f718 fffffa80`06238010 : fffffa80`04f6a050 fffffa60`03021f81 fffffa80`07f87a60 fffffa80`07f87a60 : 0xfffffa80`04f6a1a0
fffff800`03c3f720 fffffa80`04f6a050 : fffffa60`03021f81 fffffa80`07f87a60 fffffa80`07f87a60 fffffa80`079e3010 : 0xfffffa80`06238010
fffff800`03c3f728 fffffa60`03021f81 : fffffa80`07f87a60 fffffa80`07f87a60 fffffa80`079e3010 fffffa80`05dbab80 : 0xfffffa80`04f6a050
fffff800`03c3f730 fffffa60`03037007 : fffffa80`079e3010 fffffa80`52547571 fffffa80`079e3010 00000000`80000300 : USBPORT!USBPORT_Core_QueueTransferUrb+0x1a9
fffff800`03c3f770 fffffa60`030369e1 : fffffa80`04f6a1a0 fffffa80`52546c61 fffffa80`079e64f0 fffffa80`06238010 : USBPORT!USBPORT_AsyncTransfer+0x8f
fffff800`03c3f7a0 fffffa60`0303e6d2 : fffffa80`0636c050 fffffa80`04f6a050 fffffa80`06238010 fffffa80`06360009 : USBPORT!USBPORT_ProcessURB+0x9d1
fffff800`03c3f880 fffffa60`0300f662 : fffffa80`06238010 fffffa80`06238248 fffffa80`052b45c0 00000000`00000000 : USBPORT!USBPORT_PdoInternalDeviceControlIrp+0x1ea
fffff800`03c3f8d0 fffffa60`03c5f134 : fffffa80`06450050 fffffa80`0797c060 fffffa80`06238010 fffffa80`0797c1b0 : USBPORT!USBPORT_Dispatch+0x396
fffff800`03c3f940 fffffa60`03c8accd : 00000000`00000000 00000000`00000000 fffffa80`0797c060 00000000`00000002 : usbhub!UsbhFdoUrbPdoFilter+0xe0
fffff800`03c3f970 fffffa60`03c5dbc7 : fffffa80`07a131b8 fffffa80`079cdb88 00000000`00000000 fffffa80`06238010 : usbhub!UsbhPdoInternalDeviceControl+0x375
fffff800`03c3f9c0 fffffa60`089a8d83 : fffffa80`079cdb88 00000000`00220003 fffffa80`06238010 00000000`00000324 : usbhub!UsbhGenDispatch+0x57
fffff800`03c3fa00 fffffa60`089a5484 : fffffa80`07a131b8 00000000`00000000 fffffa80`079cdb88 fffffa80`06238010 : usbccgp!UsbcForwardIrp+0x87
fffff800`03c3fa50 fffffa60`089a573a : fffffa80`07a131b8 00000000`00220003 fffffa80`06238010 fffffa80`079cdb88 : usbccgp!DispatchPdoUrb+0x108
fffff800`03c3fa90 fffffa60`089a3695 : fffffa80`07a131b8 fffffa80`079cdb88 fffffa80`07a131b0 fffffa80`06238010 : usbccgp!DispatchPdoInternalDeviceControl+0x18a
fffff800`03c3fad0 fffffa60`089c17c0 : fffffa80`07a13060 00000000`00000001 fffffa80`079b2000 fffffa80`06238010 : usbccgp!USBC_Dispatch+0x269
fffff800`03c3fb40 fffffa60`089c13b9 : fffffa80`079b2060 00000000`00000000 fffff800`03c3fbe0 fffffa80`06238010 : hidusb!HumReadReport+0x138
fffff800`03c3fb90 fffffa60`089cc173 : fffffa80`0798bc01 00000000`00000000 fffffa80`0798bcf0 fffffa80`079b21d0 : hidusb!HumInternalIoctl+0x99
fffff800`03c3fbe0 fffffa60`089cc69c : fffffa80`0798bcf0 00000000`00000000 00000000`00000008 00000000`00000000 : HIDCLASS!HidpSubmitInterruptRead+0xa7
fffff800`03c3fc20 fffff800`02ab16c5 : fffffa80`06238010 fffffa80`05dbab00 fffffa80`04f6b301 00000000`00000000 : HIDCLASS!HidpInterruptReadComplete+0x218
fffff800`03c3fc90 fffffa60`03022d68 : fffffa80`04f6a050 fffffa80`04f6a000 fffffa80`04f6a1a0 fffffa80`04f6a050 : nt!IopfCompleteRequest+0x315
fffff800`03c3fd50 fffffa60`03023420 : fffffa80`54546b63 fffffa80`06238010 fffff800`32466d64 fffffa80`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x898
fffff800`03c3fe30 fffffa60`03020872 : fffffa80`39585043 fffffa80`04f6a1a0 fffffa80`04f6b088 fffffa80`04f6a1a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x514
fffff800`03c3fea0 fffffa60`0300d18b : fffffa80`31636f49 fffffa80`04f6b088 fffffa60`11c0cc02 fffffa80`04f6a1a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a
fffff800`03c3fef0 fffff800`02ab89d7 : fffffa80`04f6b0a0 fffffa60`34776478 fffffa60`11c0cca0 fffff800`02bd1a80 : USBPORT!USBPORT_Xdpc_Worker+0x26f
fffff800`03c3ff40 fffff800`02ab2825 : fffffa60`0300cf1c fffff800`02bce680 fffffa60`11c0cca0 fffffa80`04b51c00 : nt!KiRetireDpcList+0x117
fffff800`03c3ffb0 fffff800`02ab2637 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffffa60`11c0cbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_ReferenceEndpoint+55
fffffa60`03012781 488b6c2458 mov rbp,qword ptr [rsp+58h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: USBPORT!USBPORT_ReferenceEndpoint+55
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 479199d8
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_USBPORT!USBPORT_ReferenceEndpoint+55
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_USBPORT!USBPORT_ReferenceEndpoint+55
Followup: MachineOwner
---------