Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x8261c000 PsLoadedModuleList = 0x827665b0
Debug session time: Tue May  5 17:12:19.671 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:39.106
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D6, {fbda3000, 1, 94a60935, 0}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!scl_ApplyTranslation+9b )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fbda3000, memory referenced
Arg2: 00000001, value 0 = read operation, 1 = write operation
Arg3: 94a60935, if non-zero, the address which referenced memory.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8278684c
Unable to read MiSystemVaType memory at 82765f00
 fbda3000 

FAULTING_IP: 
win32k!scl_ApplyTranslation+9b
94a60935 011487          add     dword ptr [edi+eax*4],edx

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD6

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 94a62292 to 94a60935

STACK_TEXT:  
905b95ec 94a62292 00000001 00000000 00000000 win32k!scl_ApplyTranslation+0x9b
905b9610 94a5f419 fbda2358 fbda2bfc fbda23cc win32k!fsg_GridFit+0xdd
905b9688 94a6906c 00000001 905b96a4 94a68fc3 win32k!fs__Contour+0x287
905b9694 94a68fc3 fbda2118 fbda2184 905b96c0 win32k!fs_ContourGridFit+0x12
905b96a4 94a6991f fbda2118 fbda2184 000000e7 win32k!fs_NewContourGridFit+0x10
905b96c0 94a69960 fb618e78 000000e7 905b96fc win32k!bGetGlyphOutline+0xd7
905b96e8 94a69b59 fb618e78 000000e7 00000001 win32k!bGetGlyphMetrics+0x20
905b982c 94a5ec63 fb618e78 000000e7 905b9918 win32k!lGetGlyphBitmap+0x2b
905b9850 94a5eab6 00000000 00000001 000000e7 win32k!ttfdQueryFontData+0x158
905b98a0 94a5dce2 ff7af010 fb6d4cf0 00000001 win32k!ttfdSemQueryFontData+0x45
905b98e8 94a63774 ff7af010 fb6d4cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
905b9960 94adbc8d 905b9c3c fb64abb8 ff6e4270 win32k!xInsertMetricsPlusRFONTOBJ+0x120
905b9990 94a5594d 00000008 ff7bf030 905b9cd6 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
905b99c8 94adb78b 905b9c1c 905b9c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
905b9a0c 94a555d0 905b9cd0 00000008 905b9c1c win32k!ESTROBJ::vInit+0x268
905b9c2c 94a55793 00000000 905b9cd0 fb6d4cf0 win32k!GreGetTextExtentExW+0x12a
905b9d0c 82659896 03010241 01260bb0 00000008 win32k!NtGdiGetTextExtentExW+0x141
905b9d0c 779770f4 03010241 01260bb0 00000008 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
001cf724 00000000 00000000 00000000 00000000 0x779770f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!scl_ApplyTranslation+9b
94a60935 011487          add     dword ptr [edi+eax*4],edx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!scl_ApplyTranslation+9b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0xD6_win32k!scl_ApplyTranslation+9b

BUCKET_ID:  0xD6_win32k!scl_ApplyTranslation+9b

Followup: MachineOwner
---------
