Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82618000 PsLoadedModuleList = 0x827625b0
Debug session time: Tue May  5 17:52:43.898 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:04.002
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000BE, {92061046, 818bf021, 99c47444, b}

Probably caused by : hardware ( win32k!fsg_DoScanControl+4 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 92061046, Virtual address for the attempted write.
Arg2: 818bf021, PTE contents.
Arg3: 99c47444, (reserved)
Arg4: 0000000b, (reserved)

Debugging Details:
------------------


DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xBE

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

MISALIGNED_IP: 
win32k!fsg_DoScanControl+4
92061046 0100            add     dword ptr [eax],eax

LAST_CONTROL_TRANSFER:  from 9204a9cc to 92061046

STACK_TEXT:  
99c474b4 9204a9cc 99c47504 ff6d8efc ff6d8e94 win32k!fsg_DoScanControl+0x4
99c474c8 92044483 00000000 00000001 00000001 win32k!scl_CalcComponentOffset+0x21
99c47538 92061ef8 00000800 ff6d8e94 ff6d8e94 win32k!fsg_MergeGlyphData+0x12a
99c47574 9206238c ff6d8250 ff6d8f1c ff6d948c win32k!fsg_ExecuteGlyph+0x268
99c475d0 92062202 ff6d8250 ff6d948c ff6d8ddc win32k!fsg_CreateGlyphData+0xea
99c47610 9205f419 ff6d8250 ff6d948c ff6d82c4 win32k!fsg_GridFit+0x4d
99c47688 9206906c 00000000 99c476a4 92068fc3 win32k!fs__Contour+0x287
99c47694 92068fc3 ff6d8010 ff6d807c 99c476c0 win32k!fs_ContourGridFit+0x12
99c476a4 9206991f ff6d8010 ff6d807c 00000081 win32k!fs_NewContourGridFit+0x10
99c476c0 92069960 fba02e78 00000081 99c476fc win32k!bGetGlyphOutline+0xd7
99c476e8 92069b59 fba02e78 00000081 00000001 win32k!bGetGlyphMetrics+0x20
99c4782c 9205ec63 fba02e78 00000081 99c47918 win32k!lGetGlyphBitmap+0x2b
99c47850 9205eab6 00000000 00000001 00000081 win32k!ttfdQueryFontData+0x158
99c478a0 9205dce2 ff7af010 fba00cf0 00000001 win32k!ttfdSemQueryFontData+0x45
99c478e8 92063774 ff7af010 fba00cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
99c47960 920dbc8d 99c47c3c fba06bdc ff6d470c win32k!xInsertMetricsPlusRFONTOBJ+0x120
99c47990 9205594d 00000008 ff7bf050 99c47cda win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
99c479c8 920db78b 99c47c1c 99c47c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
99c47a0c 920555d0 99c47cd0 00000008 99c47c1c win32k!ESTROBJ::vInit+0x268
99c47c2c 92055793 00000000 99c47cd0 fba00cf0 win32k!GreGetTextExtentExW+0x12a
99c47d0c 82655896 0f01016b 02b30bb0 00000008 win32k!NtGdiGetTextExtentExW+0x141
99c47d0c 772e70f4 0f01016b 02b30bb0 00000008 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
0017f754 00000000 00000000 00000000 00000000 0x772e70f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!fsg_DoScanControl+4
92061046 0100            add     dword ptr [eax],eax

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!fsg_DoScanControl+4

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

BUCKET_ID:  IP_MISALIGNED

Followup: MachineOwner
---------
