Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x8263a000 PsLoadedModuleList = 0x827845b0
Debug session time: Wed May  6 00:58:37.298 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:52.845
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {ff669e38, 0, 9196a33d, 0}


Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!itrp_IUP+141 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ff669e38, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9196a33d, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 827a484c
Unable to read MiSystemVaType memory at 82783f00
 ff669e38 

FAULTING_IP: 
win32k!itrp_IUP+141
9196a33d 840c16          test    byte ptr [esi+edx],cl

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 9196bc79 to 9196a33d

STACK_TEXT:  
9a04b6f4 9196bc79 00000001 919717d3 00000000 win32k!itrp_IUP+0x141
9a04b6fc 919717d3 00000000 ff65aa70 ff65b3bc win32k!itrp_InnerExecute+0x38
9a04b734 9196bc79 ff65aa70 9196f088 ff65ab04 win32k!itrp_CALL+0x23b
9a04b73c 9196f088 ff65ab04 ff65aacc ff65b434 win32k!itrp_InnerExecute+0x38
9a04b7bc 9196cbd8 ff65b388 ff65b3bc ff65aa70 win32k!itrp_Execute+0x2b2
9a04b7f0 919759db ff65aa70 00000000 ff659298 win32k!itrp_ExecutePrePgm+0x5d
9a04b80c 9196f32c ff659250 ff65a5cc ff6592c4 win32k!fsg_RunPreProgram+0x78
9a04b86c 9197906c 00000001 9a04b888 91978fc3 win32k!fs__Contour+0x19a
9a04b878 91978fc3 ff659010 ff65907c 9a04b8a4 win32k!fs_ContourGridFit+0x12
9a04b888 9197991f ff659010 ff65907c 00000003 win32k!fs_NewContourGridFit+0x10
9a04b8a4 91979960 fbf3ce78 00000003 9a04b8e0 win32k!bGetGlyphOutline+0xd7
9a04b8cc 91979b59 fbf3ce78 00000003 00000001 win32k!bGetGlyphMetrics+0x20
9a04ba10 9196ec63 fbf3ce78 00000003 9a04bafc win32k!lGetGlyphBitmap+0x2b
9a04ba34 9196eab6 00000000 00000001 00000003 win32k!ttfdQueryFontData+0x158
9a04ba84 9196dce2 ff7af010 fc04acf0 00000001 win32k!ttfdSemQueryFontData+0x45
9a04bacc 9196de59 ff7af010 fc04acf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
9a04bb40 9196b971 00000002 9a04bcf4 00000000 win32k!RFONTOBJ::bInitCache+0xd4
9a04bbfc 919e7bb0 9a04bcdc 9a04bca0 00000003 win32k!RFONTOBJ::bRealizeFont+0x5df
9a04bca8 919e7deb fbe7ed80 00000000 00000002 win32k!RFONTOBJ::bInit+0x2e3
9a04bcc0 91a149a0 9a04bcdc 00000000 00000002 win32k!RFONTOBJ::vInit+0x16
9a04bcec 91a14a59 fc04acf0 00000000 0bb6fa47 win32k!GreGetFontUnicodeRanges+0x2d
9a04bd24 82677896 0401010c 00000000 001ff780 win32k!NtGdiGetFontUnicodeRanges+0x17
9a04bd24 77bf70f4 0401010c 00000000 001ff780 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
001ff780 00000000 00000000 00000000 00000000 0x77bf70f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!itrp_IUP+141
9196a33d 840c16          test    byte ptr [esi+edx],cl

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  win32k!itrp_IUP+141

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54ee8ecd

FAILURE_BUCKET_ID:  0x50_win32k!itrp_IUP+141

BUCKET_ID:  0x50_win32k!itrp_IUP+141

Followup: MachineOwner
---------
