Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18933.amd64fre.win7sp1_gdr.150715-0600
Machine Name:
Kernel base = 0xfffff800`0285e000 PsLoadedModuleList = 0xfffff800`02aa5730
Debug session time: Wed Aug 19 13:18:51.868 2015 (UTC + 2:00)
System Uptime: 0 days 0:01:33.790
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D6, {fffff900c179d000, 1, fffff96000314dfb, 0}

Unable to load image VBoxDisp.dll, Win32 error 0n2
*** WARNING: Unable to verify timestamp for VBoxDisp.dll
*** ERROR: Module load completed but symbols could not be loaded for VBoxDisp.dll

Could not read faulting driver name
Probably caused by : VBoxDisp.dll ( VBoxDisp+4b4b )

Followup: MachineOwner
---------

1: kd> !analyze -v; .logclose; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_PAGE_FAULT_BEYOND_END_OF_ALLOCATION (d6)
N bytes of memory was allocated and more than N bytes are being referenced.
This cannot be protected by try-except.
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff900c179d000, memory referenced
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation
Arg3: fffff96000314dfb, if non-zero, the address which referenced memory.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b0f100
 fffff900c179d000 

FAULTING_IP: 
win32k!or_all_N_wide_unrotated+2b
fffff960`00314dfb 0802            or      byte ptr [rdx],al

MM_INTERNAL_CODE:  0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD6

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880073a5690 -- (.trap 0xfffff880073a5690)
.trap 0xfffff880073a5690
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c179d002
rdx=fffff900c179d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff96000314dfb rsp=fffff880073a5828 rbp=000000000000002d
 r8=00000000fffffff3  r9=fffff900c4a6569a r10=fffff900c179d015
r11=fffffffffffffff3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
win32k!or_all_N_wide_unrotated+0x2b:
fffff960`00314dfb 0802            or      byte ptr [rdx],al ds:07f2:fffff900`c179d000=??
.trap
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000294e017 to fffff800028d15c0

STACK_TEXT:  
fffff880`073a5528 fffff800`0294e017 : 00000000`00000050 fffff900`c179d000 00000000`00000001 fffff880`073a5690 : nt!KeBugCheckEx
fffff880`073a5530 fffff800`028cf6ee : 00000000`00000001 fffff900`c179d000 fffff900`c1ac0000 00000000`0000002d : nt! ?? ::FNODOBFM::`string'+0x4174f
fffff880`073a5690 fffff960`00314dfb : fffff960`000a8f1f fffff900`c4632f80 fffff880`073a5850 fffff880`073a59f8 : nt!KiPageFault+0x16e
fffff880`073a5828 fffff960`000a8f1f : fffff900`c4632f80 fffff880`073a5850 fffff880`073a59f8 00000158`0000000e : win32k!or_all_N_wide_unrotated+0x2b
fffff880`073a5830 fffff960`000dba0d : 00000000`00000000 fffff880`073a6780 00000000`00000000 00000000`00000008 : win32k!draw_nf_ntb_o_to_temp_start+0x10f
fffff880`073a5890 fffff960`000b5ab8 : 00000000`00000000 fffff900`c179ca00 fffff900`c4632ed0 00000000`ffffffff : win32k!vExpandAndCopyText+0x1c5
fffff880`073a5c30 fffff960`00824b4b : fffff900`00000008 fffff880`00000002 fffff900`c4ce0ca0 fffff880`073a6368 : win32k!EngTextOut+0xe54
fffff880`073a5fc0 fffff900`00000008 : fffff880`00000002 fffff900`c4ce0ca0 fffff880`073a6368 00000000`00000000 : VBoxDisp+0x4b4b
fffff880`073a5fc8 fffff880`00000002 : fffff900`c4ce0ca0 fffff880`073a6368 00000000`00000000 00000000`00000000 : 0xfffff900`00000008
fffff880`073a5fd0 fffff900`c4ce0ca0 : fffff880`073a6368 00000000`00000000 00000000`00000000 fffff900`c181ed58 : 0xfffff880`00000002
fffff880`073a5fd8 fffff880`073a6368 : 00000000`00000000 00000000`00000000 fffff900`c181ed58 fffff900`c181ede8 : 0xfffff900`c4ce0ca0
fffff880`073a5fe0 00000000`00000000 : 00000000`00000000 fffff900`c181ed58 fffff900`c181ede8 fffff900`c181ec30 : 0xfffff880`073a6368


STACK_COMMAND:  kb

FOLLOWUP_IP: 
VBoxDisp+4b4b
fffff960`00824b4b ??              ???

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  VBoxDisp+4b4b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: VBoxDisp

IMAGE_NAME:  VBoxDisp.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  550705cb

FAILURE_BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

BUCKET_ID:  X64_0xD6_VBoxDisp+4b4b

Followup: MachineOwner
---------
