This one is caused by your EVGA Precision tools. I would remove it, or update it.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\AppData\Local\Temp\7zOCACE.tmp\062410-52609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c4ae50
Debug session time: Wed Jun 23 15:58:29.930 2010 (UTC - 7:00)
System Uptime: 0 days 0:25:26.727
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {f6, fc, fffffa800454c060, fffff88007928522}
Unable to load image \??\C:\Program Files (x86)\MSI Afterburner\RTCore64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTCore64.sys
*** ERROR: Module load completed but symbols could not be loaded for RTCore64.sys
Probably caused by : RTCore64.sys ( RTCore64+1522 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 00000000000000fc, Handle value being referenced.
Arg3: fffffa800454c060, Address of the current process.
Arg4: fffff88007928522, Address inside the driver that is performing the incorrect reference.
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_f6
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: MSIAfterburner
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f073dc to fffff80002a7d600
STACK_TEXT:
fffff880`07d955a8 fffff800`02f073dc : 00000000`000000c4 00000000`000000f6 00000000`000000fc fffffa80`0454c060 : nt!KeBugCheckEx
fffff880`07d955b0 fffff800`02f1cae4 : 00000000`000000fc fffffa80`0454c060 00000000`00000002 00000000`00000001 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`07d955f0 fffff800`02cd9580 : 00000000`00000000 fffff880`07d95820 00000000`00000000 00000000`00000000 : nt!VfCheckUserHandle+0x1b4
fffff880`07d956d0 fffff800`02d55425 : 00000000`00000000 00000000`000f001f 00000000`00000000 fffff800`02d55400 : nt! ?? ::NNGAKEGL::`string'+0x20e1e
fffff880`07d957a0 fffff800`02f1c878 : 00000000`00000004 00000000`00000002 fffff880`07d95890 fffff800`02a78df0 : nt!ObReferenceObjectByHandle+0x25
fffff880`07d957f0 fffff880`07928522 : 00000000`fdac0000 00000000`00000002 00000000`00000004 fffff800`00000000 : nt!VerifierObReferenceObjectByHandle+0x48
fffff880`07d95840 00000000`fdac0000 : 00000000`00000002 00000000`00000004 fffff800`00000000 fffff880`07d958c8 : RTCore64+0x1522
fffff880`07d95848 00000000`00000002 : 00000000`00000004 fffff800`00000000 fffff880`07d958c8 00000000`00000000 : 0xfdac0000
fffff880`07d95850 00000000`00000004 : fffff800`00000000 fffff880`07d958c8 00000000`00000000 fffff800`02d996b7 : 0x2
fffff880`07d95858 fffff800`00000000 : fffff880`07d958c8 00000000`00000000 fffff800`02d996b7 fffff800`02d996b7 : 0x4
fffff880`07d95860 fffff880`07d958c8 : 00000000`00000000 fffff800`02d996b7 fffff800`02d996b7 fffffa80`060acf40 : 0xfffff800`00000000
fffff880`07d95868 00000000`00000000 : fffff800`02d996b7 fffff800`02d996b7 fffffa80`060acf40 fffff800`02d996b7 : 0xfffff880`07d958c8
STACK_COMMAND: kb
FOLLOWUP_IP:
RTCore64+1522
fffff880`07928522 85c0 test eax,eax
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: RTCore64+1522
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RTCore64
IMAGE_NAME: RTCore64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 42941d90
FAILURE_BUCKET_ID: X64_0xc4_f6_VRF_RTCore64+1522
BUCKET_ID: X64_0xc4_f6_VRF_RTCore64+1522
Followup: MachineOwner
---------
~Lordbob