Try a system files check.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Jonathan\AppData\Local\Temp\Temp1_062310-25786-01.zip\062310-25786-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82a1e000 PsLoadedModuleList = 0x82b66810
Debug session time: Wed Jun 23 16:54:56.262 2010 (UTC - 4:00)
System Uptime: 0 days 0:01:31.870
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 000000f6, Referencing user handle as KernelMode.
Arg2: 000000ac, Handle value being referenced.
Arg3: a1ffc8e8, Address of the current process.
Arg4: aacc5cb6, Address inside the driver that is performing the incorrect reference.
Debugging Details:
------------------
*** ERROR: Module load completed but symbols could not be loaded for gdrv.sys
BUGCHECK_STR: 0xc4_f6
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: GUI.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82d52f03 to 82afad10
STACK_TEXT:
a6dd0a04 82d52f03 000000c4 000000f6 000000ac nt!KeBugCheckEx+0x1e
a6dd0a24 82d57766 000000ac a1ffc8e8 ab011968 nt!VerifierBugCheckIfAppropriate+0x30
a6dd0ab8 82c422b4 000000ac aa9c0fe0 00000000 nt!VfCheckUserHandle+0x14f
a6dd0ae8 82c4216e 000000ac 000f001f 00000000 nt!ObReferenceObjectByHandleWithTag+0x13b
a6dd0b0c 82d60736 000000ac 000f001f 00000000 nt!ObReferenceObjectByHandle+0x21
a6dd0b34 aacc5cb6 000000ac 000f001f 00000000 nt!VerifierObReferenceObjectByHandle+0x21
WARNING: Stack unwind information not available. Following frames may be wrong.
a6dd0bb8 aacc54e6 9e8ee978 00000000 00000000 gdrv+0xcb6
a6dd0bdc 82d4d6c3 00000004 00000020 9e7471a8 gdrv+0x4e6
a6dd0c00 82a5a473 00000000 a001af68 9e8ee978 nt!IovCallDriver+0x258
a6dd0c14 82c5bf2e 9e7471a8 a001af68 a001afd8 nt!IofCallDriver+0x1b
a6dd0c34 82c78d11 9e8ee978 9e7471a8 00000000 nt!IopSynchronousServiceTail+0x1f8
a6dd0cd0 82c7b4ec 9e8ee978 a001af68 00000000 nt!IopXxxControlFile+0x6aa
a6dd0d04 82a6144a 000000a8 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
a6dd0d04 778664f4 000000a8 00000000 00000000 nt!KiFastCallEntry+0x12a
0012ef78 00000000 00000000 00000000 00000000 0x778664f4
STACK_COMMAND: kb
FOLLOWUP_IP:
gdrv+cb6
aacc5cb6 3bc3 cmp eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: gdrv+cb6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: gdrv
IMAGE_NAME: gdrv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49b9d04c
FAILURE_BUCKET_ID: 0xc4_f6_VRF_gdrv+cb6
BUCKET_ID: 0xc4_f6_VRF_gdrv+cb6
Followup: MachineOwner
---------