Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x8261b000 PsLoadedModuleList = 0x827655b0
Debug session time: Sun May 10 10:46:28.512 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:14.086
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {e7e7e81f, 1, 91e345c9, 2}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+345c9 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e7e7e81f, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 91e345c9, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8278584c
Unable to read MiSystemVaType memory at 82764f00
 e7e7e81f 

FAULTING_IP: 
ATMFD+345c9
91e345c9 83483810        or      dword ptr [eax+38h],10h

MM_INTERNAL_CODE:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 91e29eec to 91e345c9

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
879cfe10 91e29eec fd480a00 ff6b5038 91e463ec ATMFD+0x345c9
879cfe34 91e2e987 fd406c70 91e463ec 00000f5c ATMFD+0x29eec
879d0544 91e2f6e0 fd406c70 91e3f028 879d0790 ATMFD+0x2e987
879d0600 91e227ae fd406c70 91e3f028 879d0790 ATMFD+0x2f6e0
879d06ec 91e22858 fd406c70 879d0790 879d0814 ATMFD+0x227ae
879d0718 91e132b2 fd406c70 91e3f028 879d0790 ATMFD+0x22858
879d087c 91e13689 ffffffff 879d099c fbe76f60 ATMFD+0x132b2
879d08d0 91e0406d ffffffff 879d099c 00000000 ATMFD+0x13689
879d0924 91f2dce2 ff7af010 fc58ecf0 00000001 ATMFD+0x406d
879d096c 91f167bb ff7af010 fc58ecf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
879d09e0 91f414d7 ffa66130 ff6ad028 00000005 win32k!xInsertMetricsRFONTOBJ+0x9c
879d0a14 91f435b9 00000020 879d0a8c 879d0c7e win32k!RFONTOBJ::bGetGlyphMetrics+0x131
879d0cb8 91f56644 040101b8 00000020 00000040 win32k!GreGetCharABCWidthsW+0x147
879d0d14 82658896 040101b8 00000000 00000040 win32k!NtGdiGetCharABCWidthsW+0xf8
879d0d14 778870f4 040101b8 00000000 00000040 nt!KiSystemServicePostCall
0022f1ec 00000000 00000000 00000000 00000000 0x778870f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+345c9
91e345c9 83483810        or      dword ptr [eax+38h],10h

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+345c9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+345c9

BUCKET_ID:  0x50_ATMFD+345c9

Followup: MachineOwner
---------
