Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82616000 PsLoadedModuleList = 0x827605b0
Debug session time: Sat May  9 22:13:34.145 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:39.036
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {b5b00170, 0, 91c5bf53, 2}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+bf53 )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: b5b00170, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 91c5bf53, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 8278084c
Unable to read MiSystemVaType memory at 8275ff00
 b5b00170 

FAULTING_IP: 
ATMFD+bf53
91c5bf53 8a18            mov     bl,byte ptr [eax]

MM_INTERNAL_CODE:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 91c577af to 91c5bf53

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
99e5b938 91c577af 082c3e14 fc18ccf0 00000001 ATMFD+0xbf53
99e5ba40 91c53fe1 00000000 99e5ba64 082c3ed0 ATMFD+0x77af
99e5ba84 91dadce2 ff7af010 fc18ccf0 00000001 ATMFD+0x3fe1
99e5bacc 91dade59 ff7af010 fc18ccf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
99e5bb40 91dab971 00000002 99e5bcf4 00000000 win32k!RFONTOBJ::bInitCache+0xd4
99e5bbfc 91e27bb0 99e5bcdc 99e5bca0 00000007 win32k!RFONTOBJ::bRealizeFont+0x5df
99e5bca8 91e27deb fc196d80 00000000 00000002 win32k!RFONTOBJ::bInit+0x2e3
99e5bcc0 91e549a0 99e5bcdc 00000000 00000002 win32k!RFONTOBJ::vInit+0x16
99e5bcec 91e54a59 fc18ccf0 00000000 0813f806 win32k!GreGetFontUnicodeRanges+0x2d
99e5bd24 82653896 0301026f 00000000 0022fe4c win32k!NtGdiGetFontUnicodeRanges+0x17
99e5bd24 776270f4 0301026f 00000000 0022fe4c nt!KiSystemServicePostCall
0022fe4c 00000000 00000000 00000000 00000000 0x776270f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+bf53
91c5bf53 8a18            mov     bl,byte ptr [eax]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+bf53

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+bf53

BUCKET_ID:  0x50_ATMFD+bf53

Followup: MachineOwner
---------
