Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18933.amd64fre.win7sp1_gdr.150715-0600
Machine Name:
Kernel base = 0xfffff800`0281e000 PsLoadedModuleList = 0xfffff800`02a65730
Debug session time: Wed Aug 19 13:06:44.268 2015 (UTC + 2:00)
System Uptime: 0 days 0:02:05.493
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D6, {fffff900c4c75000, 1, fffff96000354c14, 0}

Unable to load image VBoxDisp.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for VBoxDisp.dll
*** ERROR: Module load completed but symbols could not be loaded for VBoxDisp.dll

Probably caused by : VBoxDisp.dll ( VBoxDisp+4b4b )

Followup: MachineOwner
---------

1: kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff900c4c75000, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff96000354c14, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002acf100
 fffff900c4c75000 

FAULTING_IP: 
win32k!or_all_N_wide_rotated_need_last+70
fffff960`00354c14 410802          or      byte ptr [r10],al

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD6

CURRENT_IRQL:  0

TRAP_FRAME:  fffff8800780f690 -- (.trap 0xfffff8800780f690)
.trap 0xfffff8800780f690
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800780f8ff rbx=0000000000000000 rcx=0000000000000004
rdx=00000000000000ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000354c14 rsp=fffff8800780f820 rbp=0000000000000008
 r8=00000000000000ff  r9=fffff900c1b95a2c r10=fffff900c4c75000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32k!or_all_N_wide_rotated_need_last+0x70:
fffff960`00354c14 410802          or      byte ptr [r10],al ds:1750:fffff900`c4c75000=??
.trap
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000290e017 to fffff800028915c0

STACK_TEXT:  
fffff880`0780f528 fffff800`0290e017 : 00000000`00000050 fffff900`c4c75000 00000000`00000001 fffff880`0780f690 : nt!KeBugCheckEx
fffff880`0780f530 fffff800`0288f6ee : 00000000`00000001 fffff900`c4c75000 fffff900`c4400000 fffff900`c4c7500d : nt! ?? ::FNODOBFM::`string'+0x4174f
fffff880`0780f690 fffff960`00354c14 : 00000000`00000014 fffff960`000e8f1f fffff900`c4744f98 00000000`00000014 : nt!KiPageFault+0x16e
fffff880`0780f820 fffff960`000e8f1f : fffff900`c4744f98 00000000`00000014 00000000`00000002 00000000`00000001 : win32k!or_all_N_wide_rotated_need_last+0x70
fffff880`0780f830 fffff960`0011ba0d : 00000000`00000000 fffff880`07810780 00000000`00000000 00000000`00000003 : win32k!draw_nf_ntb_o_to_temp_start+0x10f
fffff880`0780f890 fffff960`000f5ab8 : 00000000`00000000 fffff900`c4c74ac0 fffff900`c4744f78 00000000`00ffffff : win32k!vExpandAndCopyText+0x1c5
fffff880`0780fc30 fffff960`00994b4b : fffff900`00000003 fffff880`00000002 fffff900`c2950ca0 fffff880`07810368 : win32k!EngTextOut+0xe54
fffff880`0780ffc0 fffff900`00000003 : fffff880`00000002 fffff900`c2950ca0 fffff880`07810368 00000000`00000000 : VBoxDisp+0x4b4b
fffff880`0780ffc8 fffff880`00000002 : fffff900`c2950ca0 fffff880`07810368 00000000`00000000 fffff880`07810110 : 0xfffff900`00000003
fffff880`0780ffd0 fffff900`c2950ca0 : fffff880`07810368 00000000`00000000 fffff880`07810110 fffff900`c4842d58 : 0xfffff880`00000002
fffff880`0780ffd8 fffff880`07810368 : 00000000`00000000 fffff880`07810110 fffff900`c4842d58 fffff900`c4842de8 : 0xfffff900`c2950ca0
fffff880`0780ffe0 00000000`00000000 : fffff880`07810110 fffff900`c4842d58 fffff900`c4842de8 fffff900`c4842c30 : 0xfffff880`07810368


STACK_COMMAND:  kb

FOLLOWUP_IP: 
VBoxDisp+4b4b
fffff960`00994b4b ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  VBoxDisp+4b4b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: VBoxDisp

IMAGE_NAME:  VBoxDisp.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  550705cb

FAILURE_BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

Followup: MachineOwner
---------
