Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18933.amd64fre.win7sp1_gdr.150715-0600
Machine Name:
Kernel base = 0xfffff800`0281a000 PsLoadedModuleList = 0xfffff800`02a61730
Debug session time: Wed Aug 19 13:04:25.154 2015 (UTC + 2:00)
System Uptime: 0 days 0:03:11.727
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D6, {fffff900c29bd000, 1, fffff96000304d52, 0}

Unable to load image VBoxDisp.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for VBoxDisp.dll
*** ERROR: Module load completed but symbols could not be loaded for VBoxDisp.dll

Could not read faulting driver name
Probably caused by : VBoxDisp.dll ( VBoxDisp+4b4b )

Followup: MachineOwner
---------

1: kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff900c29bd000, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff96000304d52, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002acb100
 fffff900c29bd000 

FAULTING_IP: 
win32k!or_all_N_wide_rotated_no_last+5e
fffff960`00304d52 410802          or      byte ptr [r10],al

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD6

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88002418690 -- (.trap 0xfffff88002418690)
.trap 0xfffff88002418690
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002418800 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000304d52 rsp=fffff88002418820 rbp=0000000000000004
 r8=00000000ffffff00  r9=fffff900c29bd001 r10=fffff900c29bd000
r11=fffff900c1ad2bb0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32k!or_all_N_wide_rotated_no_last+0x5e:
fffff960`00304d52 410802          or      byte ptr [r10],al ds:0a88:fffff900`c29bd000=??
.trap
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000290a017 to fffff8000288d5c0

STACK_TEXT:  
fffff880`02418528 fffff800`0290a017 : 00000000`00000050 fffff900`c29bd000 00000000`00000001 fffff880`02418690 : nt!KeBugCheckEx
fffff880`02418530 fffff800`0288b6ee : 00000000`00000001 fffff900`c29bd000 fffff900`c1b8d000 fffff900`c29bcffd : nt! ?? ::FNODOBFM::`string'+0x4174f
fffff880`02418690 fffff960`00304d52 : 00000000`00000034 fffff960`00098f1f fffff900`c4cc2fb0 00000000`00000035 : nt!KiPageFault+0x16e
fffff880`02418820 fffff960`00098f1f : fffff900`c4cc2fb0 00000000`00000035 00000000`00000002 00000000`00000001 : win32k!or_all_N_wide_rotated_no_last+0x5e
fffff880`02418830 fffff960`000cba0d : 00000000`00000000 fffff880`02419780 00000000`00000000 00000000`00000005 : win32k!draw_nf_ntb_o_to_temp_start+0x10f
fffff880`02418890 fffff960`000a5ab8 : 00000000`00000000 fffff900`c29bcd70 fffff900`c4cc2f60 00000000`ffffffff : win32k!vExpandAndCopyText+0x1c5
fffff880`02418c30 fffff960`008e4b4b : fffff900`00000005 fffff880`00000002 fffff900`c29c4ca0 fffff880`02419368 : win32k!EngTextOut+0xe54
fffff880`02418fc0 fffff900`00000005 : fffff880`00000002 fffff900`c29c4ca0 fffff880`02419368 00000000`00000000 : VBoxDisp+0x4b4b
fffff880`02418fc8 fffff880`00000002 : fffff900`c29c4ca0 fffff880`02419368 00000000`00000000 00000000`00000000 : 0xfffff900`00000005
fffff880`02418fd0 fffff900`c29c4ca0 : fffff880`02419368 00000000`00000000 00000000`00000000 fffff900`c4d86d58 : 0xfffff880`00000002
fffff880`02418fd8 fffff880`02419368 : 00000000`00000000 00000000`00000000 fffff900`c4d86d58 fffff900`c4d86de8 : 0xfffff900`c29c4ca0
fffff880`02418fe0 00000000`00000000 : 00000000`00000000 fffff900`c4d86d58 fffff900`c4d86de8 fffff900`c4d86c30 : 0xfffff880`02419368


STACK_COMMAND:  kb

FOLLOWUP_IP: 
VBoxDisp+4b4b
fffff960`008e4b4b ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  VBoxDisp+4b4b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: VBoxDisp

IMAGE_NAME:  VBoxDisp.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  550705cb

FAILURE_BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

Followup: MachineOwner
---------
