Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82632000 PsLoadedModuleList = 0x8277c5b0
Debug session time: Fri May  8 20:19:57.302 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:18.562
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {fff8000c, 0, 9215440b, 0}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+3440b )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fff8000c, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 9215440b, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 8279c84c
Unable to read MiSystemVaType memory at 8277bf00
 fff8000c 

FAULTING_IP: 
ATMFD+3440b
9215440b 8b7e08          mov     edi,dword ptr [esi+8]

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 921545f7 to 9215440b

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
879d7de8 921545f7 fc78e380 00000006 fc78e398 ATMFD+0x3440b
879d7e10 92149eec fbadc880 ff649038 921663ec ATMFD+0x345f7
879d7e34 9214e987 fc644c70 921663ec 00000f5c ATMFD+0x29eec
879d8544 9214f6e0 fc644c70 9215f028 879d8790 ATMFD+0x2e987
879d8600 921427ae fc644c70 9215f028 879d8790 ATMFD+0x2f6e0
879d86ec 92142858 fc644c70 879d8790 879d8814 ATMFD+0x227ae
879d8718 921332b2 fc644c70 9215f028 879d8790 ATMFD+0x22858
879d887c 92133689 ffffffff 879d899c fc2107f0 ATMFD+0x132b2
879d88d0 9212406d ffffffff 879d899c 00000000 ATMFD+0x13689
879d8924 91e8dce2 ff7af010 fc2e2cf0 00000001 ATMFD+0x406d
879d896c 91e767bb ff7af010 fc2e2cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
879d89e0 91ea14d7 ffa66130 ff645758 000001d1 win32k!xInsertMetricsRFONTOBJ+0x9c
879d8a14 91ea35b9 00000020 879d8b4c 879d8c96 win32k!RFONTOBJ::bGetGlyphMetrics+0x131
879d8cb8 91eb6644 090102e6 000001e0 00000040 win32k!GreGetCharABCWidthsW+0x147
879d8d14 8266f896 090102e6 000001c0 00000040 win32k!NtGdiGetCharABCWidthsW+0xf8
879d8d14 76e370f4 090102e6 000001c0 00000040 nt!KiSystemServicePostCall
0030ed84 00000000 00000000 00000000 00000000 0x76e370f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+3440b
9215440b 8b7e08          mov     edi,dword ptr [esi+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+3440b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+3440b

BUCKET_ID:  0x50_ATMFD+3440b

Followup: MachineOwner
---------
