Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82647000 PsLoadedModuleList = 0x827915b0
Debug session time: Sat May  9 05:55:39.770 2015 (UTC + 2:00)
System Uptime: 0 days 0:00:47.348
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {d800003a, 0, 925a440e, 2}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+3440e )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: d800003a, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 925a440e, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 827b184c
Unable to read MiSystemVaType memory at 82790f00
 d800003a 

FAULTING_IP: 
ATMFD+3440e
925a440e f6473802        test    byte ptr [edi+38h],2

MM_INTERNAL_CODE:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 925a45f7 to 925a440e

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
879d3d64 925a45f7 fd488400 00000004 fd488410 ATMFD+0x3440e
879d3d8c 92599eec fd50c880 00000000 925b63ec ATMFD+0x345f7
879d3db0 9259e987 fbb54c70 925b63ec 00000f5c ATMFD+0x29eec
879d44c0 9259f6e0 fbb54c70 925af028 879d470c ATMFD+0x2e987
879d457c 925927ae fbb54c70 925af028 879d470c ATMFD+0x2f6e0
879d4668 92592858 fbb54c70 879d470c 879d4790 ATMFD+0x227ae
879d4694 925832b2 fbb54c70 925af028 879d470c ATMFD+0x22858
879d47f8 92583689 ffffffff 879d4918 fd2328fc ATMFD+0x132b2
879d484c 9257406d ffffffff 879d4918 fd2328fc ATMFD+0x13689
879d48a0 922ddce2 ff7af010 fd4becf0 00000001 ATMFD+0x406d
879d48e8 922e3774 ff7af010 fd4becf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
879d4960 9235bc8d 879d4c3c ff6d95ec fd2328fc win32k!xInsertMetricsPlusRFONTOBJ+0x120
879d4990 922d594d 0000000a ff7bf070 879d4cde win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
879d49c8 9235b78b 879d4c1c 879d4c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
879d4a0c 922d55d0 879d4cd0 0000000a 879d4c1c win32k!ESTROBJ::vInit+0x268
879d4c2c 922d5793 00000000 879d4cd0 fd4becf0 win32k!GreGetTextExtentExW+0x12a
879d4d0c 82684896 040101b7 00640bac 0000000a win32k!NtGdiGetTextExtentExW+0x141
879d4d0c 770e70f4 040101b7 00640bac 0000000a nt!KiSystemServicePostCall
0015f32c 00000000 00000000 00000000 00000000 0x770e70f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+3440e
925a440e f6473802        test    byte ptr [edi+38h],2

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+3440e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+3440e

BUCKET_ID:  0x50_ATMFD+3440e

Followup: MachineOwner
---------
