*** Fatal System Error: 0x00000050
                       (0xFFADEFFC,0x00000001,0x94EB3D6A,0x00000000)

Driver at fault: 
***    win32k.sys - Address 94EB3D6A base at 94E00000, DateStamp 54ee8ecd
.
Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

Connected to Windows 7 7601 x86 compatible target at (Fri Mar 27 12:47:43.661 2015 (UTC + 1:00)), ptr64 FALSE
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
................................................................
.................
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {ffadeffc, 1, 94eb3d6a, 0}

Probably caused by : win32k.sys ( win32k!CreateXlateObject+332 )

Followup: MachineOwner
---------

Assertion: *** DPC watchdog timeout
    This is NOT a break in update time
    This is most likely a BUG in an ISR
    Perform a stack trace to find the culprit
    The period will be doubled on continuation
    Use gh to continue!!

nt!KeAccumulateTicks+0x3c5:
82a7f38c cd2c            int     2Ch
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffadeffc, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 94eb3d6a, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


WRITE_ADDRESS:  ffadeffc Paged session pool

FAULTING_IP: 
win32k!CreateXlateObject+332
94eb3d6a 8907            mov     dword ptr [edi],eax

MM_INTERNAL_CODE:  0

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

MODULE_NAME: win32k

FAULTING_MODULE: 94e00000 win32k

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  iexplore.exe

CURRENT_IRQL:  1c

TRAP_FRAME:  97c538dc -- (.trap 0xffffffff97c538dc)
ErrCode = 00000002
eax=00476c61 ebx=ffbbd210 ecx=00470000 edx=00006c00 esi=ffadf0d8 edi=ffadeffc
eip=94eb3d6a esp=97c53950 ebp=97c5396c iopl=0         nv up ei ng nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
win32k!CreateXlateObject+0x332:
94eb3d6a 8907            mov     dword ptr [edi],eax  ds:0023:ffadeffc=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82a7e853 to 82a7f38c

STACK_TEXT:  
97c53300 82a7e853 0002625a 00000000 000b9000 nt!KeAccumulateTicks+0x3c5
97c53340 82a7e700 82e310a8 4b6399de 00000000 nt!KeUpdateRunTime+0x145
97c53398 82a7df03 00000002 00000002 000000d1 nt!KeUpdateSystemTime+0x613
97c53398 82e310a8 00000002 00000002 000000d1 nt!KeUpdateSystemTimeAssist+0x13
97c5341c 82e1fb8c 00001000 00000000 97c5347c hal!READ_PORT_USHORT+0x8
97c5342c 82e1fcf5 82ae2f92 85b77a31 00000065 hal!HalpCheckPowerButton+0x2e
97c53430 82ae2f92 85b77a31 00000065 00000000 hal!HaliHaltSystem+0x7
97c5347c 82ae3a39 00000003 00000000 0000af9e nt!KiBugCheckDebugBreak+0x73
97c53840 82a919ad 00000050 ffadeffc 00000001 nt!KeBugCheck2+0x68b
97c538c4 82a44a78 00000001 ffadeffc 00000000 nt!MmAccessFault+0x104
97c538c4 94eb3d6a 00000001 ffadeffc 00000000 nt!KiTrap0E+0xdc
97c5396c 94eb2329 00000000 00000000 fe8a70c8 win32k!CreateXlateObject+0x332
97c539a8 94ec0317 00000000 00000000 fe8a70c8 win32k!EXLATEOBJ::bInitXlateObj+0xdc
97c53bfc 82a41896 09010e20 00ffffff 00000000 win32k!NtGdiAlphaBlend+0x56d
97c53bfc 77c170f4 09010e20 00ffffff 00000000 nt!KiSystemServicePostCall
0026c1b8 7620847c 76208460 09010e20 00000102 ntdll!KiFastSystemCallRet
0026c1bc 76208460 09010e20 00000102 00000003 GDI32!NtGdiAlphaBlend+0xc
0026c204 74b01694 09010e20 00000102 00000003 GDI32!GdiAlphaBlend+0xf0
0026c3c0 74b6c703 0010cb68 0026c3dc 0026cb84 comctl32!CImageList::Draw+0xf30
0026c428 6a342c38 0010cb68 00000000 09010e20 comctl32!ImageList_Draw+0x7c
0026c450 6a342e5f 0010cb68 00000000 09010e20 IEFRAME!ImageList_Draw+0x40
0026c49c 6a340dde 0026cb84 0026cb84 00000000 IEFRAME!CNavToolbarCombo::_PaintSearchGlyphButton+0xa4
0026c4b0 6a340934 0026cb84 00000000 0026c72c IEFRAME!CNavToolbarCombo::OnPaintItem+0x4e
0026c674 6a33fe77 0000004e 00000000 0026cb84 IEFRAME!CAddressBand::_OnNotify+0xe8
0026c6b0 7660c4e7 0003034c 0000004e 00000000 IEFRAME!CAddressBand::_AddressBandWndProc+0xdf
0026c6dc 7660c5e7 6a33fd70 0003034c 0000004e user32!InternalCallWinProc+0x23
0026c754 76601b31 000819dc 6a33fd70 0003034c user32!UserCallWinProcCheckWow+0x14b
0026c784 76601b57 6a33fd70 0003034c 0000004e user32!CallWindowProcAorW+0x99
0026c7a4 74aff443 6a33fd70 0003034c 0000004e user32!CallWindowProcW+0x1b
0026c7c0 74aff5ee 0003034c 0000004e 00000000 comctl32!CallOriginalWndProc+0x1a
0026c824 74aff5a2 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d
0026c848 6a351c70 0003034c 0000004e 00000000 comctl32!DefSubclassProc+0x46
0026c86c 74aff5ee 0003034c 0000004e 00000000 IEFRAME!CIMEHandler::s_WndProc+0x60
0026c8d0 74aff490 00106948 0003034c 0000004e comctl32!CallNextSubclassProc+0x3d
0026c930 7660c4e7 0003034c 0000004e 00000000 comctl32!MasterSubclassProc+0x54
0026c95c 7660c5e7 74aff44c 0003034c 0000004e user32!InternalCallWinProc+0x23
0026c9d4 76605294 000819dc 74aff44c 0003034c user32!UserCallWinProcCheckWow+0x14b
0026ca14 76605582 000dbba8 010dbb10 00000000 user32!SendMessageWorker+0x4d0
0026ca34 74afc05c 0003034c 0000004e 00000000 user32!SendMessageW+0x7c
0026cad0 74af5eba 0010c770 fffffff4 0026cb84 comctl32!CCSendNotify+0xc19
0026cae4 74ae2d74 0010c770 00010001 0026cb84 comctl32!CICustomDrawNotify+0x2c
0026cc30 74ae296f 09010e20 00000102 00000000 comctl32!CToolbar::DrawButton+0x145
0026cc94 74ae2720 09010e20 0026cd30 0026cd6c comctl32!CToolbar::DrawToolbarH+0x1ae
0026cd44 74ae261d 09010e20 0026ce0c 0026cd6c comctl32!CToolbar::TBPaintImpl+0xd5
0026cda8 74ae24cd 1a010ed8 0026ce0c 00000000 comctl32!CToolbar::TBPaint+0x18c
0026ce48 74af1618 00030344 0000000f 00000000 comctl32!CToolbar::ToolbarWndProc+0xd34
0026ce68 7660c4e7 00030344 0000000f 00000000 comctl32!CToolbar::s_ToolbarWndProc+0x9d
0026ce94 7660c5e7 74af15dd 00030344 0000000f user32!InternalCallWinProc+0x23
0026cf0c 76601b31 000819dc 74af15dd 00030344 user32!UserCallWinProcCheckWow+0x14b
0026cf3c 76601b57 74af15dd 00030344 0000000f user32!CallWindowProcAorW+0x99
0026cf5c 74aff443 74af15dd 00030344 0000000f user32!CallWindowProcW+0x1b
0026cf78 74aff5ee 00030344 0000000f 00000000 comctl32!CallOriginalWndProc+0x1a
0026cfdc 74aff5a2 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d
0026d000 6a35605a 00030344 0000000f 00000000 comctl32!DefSubclassProc+0x46
0026d03c 74aff5ee 00030344 0000000f 00000000 IEFRAME!CAddressBand::s_TBWndProc+0x6a
0026d0a0 74aff490 00106858 00030344 0000000f comctl32!CallNextSubclassProc+0x3d
0026d100 7660c4e7 00030344 0000000f 00000000 comctl32!MasterSubclassProc+0x54
0026d12c 7660c5e7 74aff44c 00030344 0000000f user32!InternalCallWinProc+0x23
0026d1a4 76604f0e 000819dc 74aff44c 00030344 user32!UserCallWinProcCheckWow+0x14b
0026d200 76604f7d 010dbcb8 0000000f 00000000 user32!DispatchClientMessage+0xda
0026d228 77c1702e 0026d240 00000018 0026d28c user32!__fnDWORD+0x24
0026d254 76605d0c 76605d33 0026d2c4 14a27fcf ntdll!KiUserCallbackDispatcher+0x2e
0026d258 76605d33 0026d2c4 14a27fcf 00000000 user32!NtUserDispatchMessage+0xc
0026d29c 7660cc70 74aff44c 00000000 0026d300 user32!DispatchMessageWorker+0x3d5
0026d2ac 6a3fa68f 0026d2c4 00000000 000d0b80 user32!DispatchMessageW+0xf
0026d300 6a4633b7 000a7738 00000001 00061d00 IEFRAME!CBrowserFrame::FrameMessagePump+0x13b
0026e3e8 6a46398b 00000001 00000000 00061db8 IEFRAME!BrowserThreadProc+0x24e
0026e404 6a4638df 00061db8 00000000 00061db8 IEFRAME!BrowserNewThreadProc+0x8b
0026f47c 6a463713 00061db8 0026f6c0 00000000 IEFRAME!SHOpenFolderWindow+0xcf
0026f6ac 6a463573 0007f610 00000001 00000000 IEFRAME!IEWinMain+0x18b
0026f6e8 6a3843ed 00000001 00000000 0026f9a0 IEFRAME!LCIEStartAsFrame+0x4c0
0026f6f8 00fc15c6 0007f610 00000001 00000001 IEFRAME!DesktopFrameProcess+0x1d
0026f9a0 00fc1491 00fc0000 00000000 00061b22 iexplore!wWinMain+0x501
0026fa34 779eee1c 7ffd8000 0026fa80 77c337eb iexplore!_imp_load__WaitForInputIdle+0x26c
0026fa40 77c337eb 7ffd8000 7758e029 00000000 kernel32!BaseThreadInitThunk+0xe


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!CreateXlateObject+332
94eb3d6a 8907            mov     dword ptr [edi],eax

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  win32k!CreateXlateObject+332

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  0x50_win32k!CreateXlateObject+332

BUCKET_ID:  0x50_win32k!CreateXlateObject+332

Followup: MachineOwner
---------
