Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.x86fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0x82607000 PsLoadedModuleList = 0x827515b0
Debug session time: Mon May 11 10:14:48.091 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:31.441
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
Unable to load image ATMFD.DLL, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ATMFD.DLL
*** ERROR: Module load completed but symbols could not be loaded for ATMFD.DLL
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 10000050, {fff036e0, 0, 945e407b, 0}


Could not read faulting driver name
Probably caused by : ATMFD.DLL ( ATMFD+3407b )

Followup: MachineOwner
---------

kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fff036e0, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 945e407b, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from 8277184c
Unable to read MiSystemVaType memory at 82750f00
 fff036e0 

FAULTING_IP: 
ATMFD+3407b
945e407b 394e34          cmp     dword ptr [esi+34h],ecx

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 945dd5b5 to 945e407b

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
879a1db4 945dd5b5 fbb26880 fb99c830 00000f5c ATMFD+0x3407b
879a24c0 945df6e0 fb8aac70 945ef028 879a270c ATMFD+0x2d5b5
879a257c 945d27ae fb8aac70 945ef028 879a270c ATMFD+0x2f6e0
879a2668 945d2858 fb8aac70 879a270c 879a2790 ATMFD+0x227ae
879a2694 945c32b2 fb8aac70 945ef028 879a270c ATMFD+0x22858
879a27f8 945c3689 0000000b 879a2918 fc21b300 ATMFD+0x132b2
879a284c 945b406d 0000000b 879a2918 fc21b300 ATMFD+0x13689
879a28a0 9431dce2 ff7af010 fba86cf0 00000001 ATMFD+0x406d
879a28e8 94323774 ff7af010 fba86cf0 00000001 win32k!PDEVOBJ::QueryFontData+0x3e
879a2960 9439bc8d 879a2c3c fc254b38 fc21b300 win32k!xInsertMetricsPlusRFONTOBJ+0x120
879a2990 9431594d 00000002 ff7bf010 879a2cd2 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x179
879a29c8 9439b78b 879a2c1c 879a2c3c 00000008 win32k!ESTROBJ::vCharPos_H3+0xf0
879a2a0c 943155d0 879a2cd0 00000002 879a2c1c win32k!ESTROBJ::vInit+0x268
879a2c2c 94315793 00000000 879a2cd0 fba86cf0 win32k!GreGetTextExtentExW+0x12a
879a2d0c 82644896 09010180 03150b04 00000002 win32k!NtGdiGetTextExtentExW+0x141
879a2d0c 77ca70f4 09010180 03150b04 00000002 nt!KiSystemServicePostCall
002af4c4 00000000 00000000 00000000 00000000 0x77ca70f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ATMFD+3407b
945e407b 394e34          cmp     dword ptr [esi+34h],ecx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  ATMFD+3407b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ATMFD

IMAGE_NAME:  ATMFD.DLL

DEBUG_FLR_IMAGE_TIMESTAMP:  54e6a55a

FAILURE_BUCKET_ID:  0x50_ATMFD+3407b

BUCKET_ID:  0x50_ATMFD+3407b

Followup: MachineOwner
---------
