Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82636000 PsLoadedModuleList = 0x827805b0
Debug session time: Fri May  8 19:40:30.255 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:01.288
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {fff9050a, 0, 925d440b, 0}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+3440b )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fff9050a, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 925d440b, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 827a084c
Unable to read MiSystemVaType memory at 8277ff00
 fff9050a 

FAULTING_IP: 
ATMFD+3440b
925d440b 8b7e08          mov     edi,dword ptr [esi+8]

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 925d45f7 to 925d440b

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
98a3ade8 925d45f7 fc0c6380 00000006 fc0c6398 ATMFD+0x3440b
98a3ae10 925c9eec fba48880 ff6c2038 925e63ec ATMFD+0x345f7
98a3ae34 925ce987 fba6ac70 925e63ec 00000f5c ATMFD+0x29eec
98a3b544 925cf6e0 fba6ac70 925df028 98a3b790 ATMFD+0x2e987
98a3b600 925c27ae fba6ac70 925df028 98a3b790 ATMFD+0x2f6e0
98a3b6ec 925c2858 fba6ac70 98a3b790 98a3b814 ATMFD+0x227ae
98a3b718 925b32b2 fba6ac70 925df028 98a3b790 ATMFD+0x22858
98a3b87c 925b3689 ffffffff 98a3b99c fc04af60 ATMFD+0x132b2
98a3b8d0 925a406d ffffffff 98a3b99c 00000000 ATMFD+0x13689
98a3b924 9230dce2 ff7af010 fc11acf0 00000001 ATMFD+0x406d
98a3b96c 922f67bb ff7af010 fc11acf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
98a3b9e0 923214d7 ffa66130 fba0cb00 000000dd win32k!xInsertMetricsRFONTOBJ+0x9c
98a3ba14 923235b9 00000020 98a3bc0c 98a3bcae win32k!RFONTOBJ::bGetGlyphMetrics+0x131
98a3bcb8 92336644 0701016c 000000e0 00000040 win32k!GreGetCharABCWidthsW+0x147
98a3bd14 82673896 0701016c 000000c0 00000040 win32k!NtGdiGetCharABCWidthsW+0xf8
98a3bd14 772670f4 0701016c 000000c0 00000040 nt!KiSystemServicePostCall
0023f424 00000000 00000000 00000000 00000000 0x772670f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+3440b
925d440b 8b7e08          mov     edi,dword ptr [esi+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+3440b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+3440b

BUCKET_ID:  0x50_ATMFD+3440b

Followup: MachineOwner
---------
