Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82606000 PsLoadedModuleList = 0x827505b0
Debug session time: Tue May  5 21:32:55.052 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:54.077
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D6, {fc41d634, 0, 943808e2, 0}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!scl_ApplyTranslation+43 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fc41d634, memory referenced
Arg2: 00000000, value 0 = read operation, 1 = write operation
Arg3: 943808e2, if non-zero, the address which referenced memory.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 8277084c
Unable to read MiSystemVaType memory at 8274ff00
 fc41d634 

FAULTING_IP: 
win32k!scl_ApplyTranslation+43
943808e2 2b3403          sub     esi,dword ptr [ebx+eax]

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD6

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 94382292 to 943808e2

STACK_TEXT:  
984335ec 94382292 00000000 00000000 00000000 win32k!scl_ApplyTranslation+0x43
98433610 9437f419 fc3dd250 fc3fe8d8 fc3dd2c4 win32k!fsg_GridFit+0xdd
98433688 9438906c 00000000 984336a4 94388fc3 win32k!fs__Contour+0x287
98433694 94388fc3 fc3dd010 fc3dd07c 984336c0 win32k!fs_ContourGridFit+0x12
984336a4 9438991f fc3dd010 fc3dd07c 0000002b win32k!fs_NewContourGridFit+0x10
984336c0 94389960 fbbaee78 0000002b 984336fc win32k!bGetGlyphOutline+0xd7
984336e8 94389b59 fbbaee78 0000002b 00000001 win32k!bGetGlyphMetrics+0x20
9843382c 9437ec63 fbbaee78 0000002b 98433918 win32k!lGetGlyphBitmap+0x2b
98433850 9437eab6 00000000 00000001 0000002b win32k!ttfdQueryFontData+0x158
984338a0 9437dce2 ff7af010 fbbeacf0 00000001 win32k!ttfdSemQueryFontData+0x45
984338e8 94383774 ff7af010 fbbeacf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
98433960 943fbc8d 98433c3c fba82d7c ff65a07c win32k!xInsertMetricsPlusRFONTOBJ+0x120
98433990 9437594d 00000001 ff7bf000 98433cd0 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
984339c8 943fb78b 98433c1c 98433c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
98433a0c 943755d0 98433cd0 00000001 98433c1c win32k!ESTROBJ::vInit+0x268
98433c2c 94375793 00000000 98433cd0 fbbeacf0 win32k!GreGetTextExtentExW+0x12a
98433d0c 82643896 1401019c 00710af4 00000001 win32k!NtGdiGetTextExtentExW+0x141
98433d0c 775070f4 1401019c 00710af4 00000001 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0020f474 00000000 00000000 00000000 00000000 0x775070f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!scl_ApplyTranslation+43
943808e2 2b3403          sub     esi,dword ptr [ebx+eax]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!scl_ApplyTranslation+43

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0xD6_win32k!scl_ApplyTranslation+43

BUCKET_ID:  0xD6_win32k!scl_ApplyTranslation+43

Followup: MachineOwner
---------
