ANd here is dmp file from winDBg it is
Dump File : 020710-12386-01.dmp
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020710-12386-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is:
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c1e000 PsLoadedModuleList = 0xfffff800`02e5be50
Debug session time: Sun Feb 7 18:07:37.010 2010 (GMT+0)
System Uptime: 0 days 0:42:06.820
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffff94050000, 0, fffff80002cafe60, 5}
Unable to load image \SystemRoot\system32\drivers\ctoss2k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ctoss2k.sys
*** ERROR: Module load completed but symbols could not be loaded for ctoss2k.sys
Could not read faulting driver name
Probably caused by : ctoss2k.sys ( ctoss2k+5d92 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff94050000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002cafe60, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec60e0
ffffffff94050000
FAULTING_IP:
nt!MmProbeAndLockPages+130
fffff800`02cafe60 410fb601 movzx eax,byte ptr [r9]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: BF2.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88006adb530 -- (.trap 0xfffff88006adb530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cafe60 rsp=fffff88006adb6c0 rbp=fffff88006adb850
r8=fffffa80091a5890 r9=ffffffff94050000 r10=0000000000000008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
nt!MmProbeAndLockPages+0x130:
fffff800`02cafe60 410fb601 movzx eax,byte ptr [r9] ds:ffffffff`94050000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d0db91 to fffff80002c8ff00
STACK_TEXT:
fffff880`06adb3c8 fffff800`02d0db91 : 00000000`00000050 ffffffff`94050000 00000000`00000000 fffff880`06adb530 : nt!KeBugCheckEx
fffff880`06adb3d0 fffff800`02c8dfee : 00000000`00000000 ffffffff`ffffffff 00000000`00000f00 fffff800`02dc24d3 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`06adb530 fffff800`02cafe60 : fffffa80`081bab40 fffff800`02d02460 fffffa80`081bab40 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`06adb6c0 fffff880`042a7d92 : fffffa80`091a5860 00000000`00000300 00000000`00000002 ffffffff`94050000 : nt!MmProbeAndLockPages+0x130
fffff880`06adb7d0 fffffa80`091a5860 : 00000000`00000300 00000000`00000002 ffffffff`94050000 00000000`00000000 : ctoss2k+0x5d92
fffff880`06adb7d8 00000000`00000300 : 00000000`00000002 ffffffff`94050000 00000000`00000000 fffffa80`073d11d0 : 0xfffffa80`091a5860
fffff880`06adb7e0 00000000`00000002 : ffffffff`94050000 00000000`00000000 fffffa80`073d11d0 00000000`00000000 : 0x300
fffff880`06adb7e8 ffffffff`94050000 : 00000000`00000000 fffffa80`073d11d0 00000000`00000000 fffff880`04382078 : 0x2
fffff880`06adb7f0 00000000`00000000 : fffffa80`073d11d0 00000000`00000000 fffff880`04382078 00000000`00000000 : 0xffffffff`94050000
STACK_COMMAND: kb
FOLLOWUP_IP:
ctoss2k+5d92
fffff880`042a7d92 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: ctoss2k+5d92
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ctoss2k
IMAGE_NAME: ctoss2k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a26b997
FAILURE_BUCKET_ID: X64_0x50_ctoss2k+5d92
BUCKET_ID: X64_0x50_ctoss2k+5d92
Followup: MachineOwner
---------