*** Fatal System Error: 0x00000050 (0xA8E91000,0x00000001,0x9975D22E,0x00000000) Driver at fault: *** ATMFD.DLL - Address 9975D22E base at 99731000, DateStamp 00000000 . Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. Connected to Windows 8 9600 x86 compatible target at (Wed Nov 19 15:48:13.241 2014 (UTC + 1:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols .............. Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {a8e91000, 1, 9975d22e, 0} Probably caused by : ATMFD.DLL ( ATMFD+2c22e ) Followup: MachineOwner --------- nt!RtlpBreakWithStatusInstruction: 81b0eef4 cc int 3 0: kd> .reload Connected to Windows 8 9600 x86 compatible target at (Wed Nov 19 16:01:53.366 2014 (UTC + 1:00)), ptr64 FALSE Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols .............. Loading unloaded module list ........ 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: a8e91000, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 9975d22e, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ WRITE_ADDRESS: a8e91000 Paged session pool FAULTING_IP: ATMFD+2c22e 9975d22e 8901 mov dword ptr [ecx],eax MM_INTERNAL_CODE: 0 IMAGE_NAME: ATMFD.DLL DEBUG_FLR_IMAGE_TIMESTAMP: 52158fac MODULE_NAME: ATMFD FAULTING_MODULE: 99731000 ATMFD DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 TRAP_FRAME: 89b37e4c -- (.trap 0xffffffff89b37e4c) ErrCode = 00000002 eax=00000000 ebx=00000000 ecx=41414141 edx=a8e91000 esi=00000016 edi=89b380ac eip=9975d22e esp=89b37ec0 ebp=89b385c4 iopl=0 nv up ei ng nz ac pe nc cs=0008 ss=0010 ds=000c es=0023 fs=0030 gs=0023 efl=00010296 ATMFD+0x2c22e: 9975d22e 8901 mov dword ptr [ecx],eax ds:000c:4141=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 81b8fcbe to 81b0eef4 STACK_TEXT: 89b3785c 81b8fcbe 00000003 c5a5f0aa 00000065 nt!RtlpBreakWithStatusInstruction 89b378b0 81b8f7d8 81c1f138 89b37cac 89b37d20 nt!KiBugCheckDebugBreak+0x1f 89b37c80 81b0dab6 00000050 a8e91000 00000001 nt!KeBugCheck2+0x676 89b37ca4 81b0d9ed 00000050 a8e91000 00000001 nt!KiBugCheck2+0xc6 89b37cc4 81b2c70c 00000050 a8e91000 00000001 nt!KeBugCheckEx+0x19 89b37d20 81a56fa5 89b37e4c 000185ec 89b37d98 nt! ?? ::FNODOBFM::`string'+0x534a 89b37da8 81b21ff5 00000001 a8e91000 00000000 nt!MmAccessFault+0x735 89b37da8 9975d22e 00000001 a8e91000 00000000 nt!KiTrap0E+0xf1 WARNING: Stack unwind information not available. Following frames may be wrong. 89b385c4 9976137c 89b38818 89b3885c 89b3883c ATMFD+0x2c22e 89b386a4 9975064b 89b38818 89b3885c 89b3883c ATMFD+0x3037c 89b387b0 997506fe 89b3885c 00000000 89b3883c ATMFD+0x1f64b 89b387d4 99743e2e a8e95c70 99775268 89b38818 ATMFD+0x1f6fe 89b38944 99743b52 ffffffff 89b38ac0 a8e462e0 ATMFD+0x12e2e 89b38994 99734f11 ffffffff 89b38ac0 00000000 ATMFD+0x12b52 89b389e8 90f58f3a 90c7e010 a8e92768 00000001 ATMFD+0x3f11 89b38a44 90f5983d 90c7e010 a8e92768 00000001 win32k!PDEVOBJ::QueryFontData+0x5c 89b38a7c 90f596f1 a8e92768 00000042 89b38ac0 win32k!ulCallAndConvertFontOutput+0x2a 89b38b0c 90f59908 00000061 00000001 89b38c9c win32k!xInsertMetricsPlusRFONTOBJ+0x185 89b38b20 90eb4294 a8e958cc 00000061 00000000 win32k!RFONTOBJ::bInsertMetricsPlus+0x25 89b38b50 90eb3fe9 0000001a 00000104 a8e956f0 win32k!RFONTOBJ::bGetGlyphMetricsPlus+0x149 89b38ba0 90f97259 89b38c80 89b38c9c 00000008 win32k!ESTROBJ::vCharPos_H3+0xa1 89b38c1c 90eb479b 90c41068 0000001a 89b38c80 win32k!ESTROBJ::vInit+0x889 89b38e50 90eb49e8 0000001a ffffffff 89b38e94 win32k!GreGetTextExtentExW+0x17d 89b38f2c 81b1eb27 0a010619 00c11d80 0000001a win32k!NtGdiGetTextExtentExW+0x16b 89b38f2c 77056ce4 0a010619 00c11d80 0000001a nt!KiSystemServicePostCall 00aeece8 00000000 00000000 00000000 00000000 ntdll!KiFastSystemCallRet STACK_COMMAND: kb FOLLOWUP_IP: ATMFD+2c22e 9975d22e 8901 mov dword ptr [ecx],eax SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: ATMFD+2c22e FOLLOWUP_NAME: MachineOwner FAILURE_BUCKET_ID: AV_ATMFD+2c22e BUCKET_ID: AV_ATMFD+2c22e Followup: MachineOwner ---------