VirtualBox

Ticket #13187: VBoxStartup.21.log

File VBoxStartup.21.log, 20.9 KB (added by ErikTheRed, 9 years ago)

Startup log for 4.3.28

Line 
11044.2284: Log file opened: 4.3.28r100309 g_hStartupLog=0000000000000110 g_uNtVerCombined=0x611db110
21044.2284: \SystemRoot\System32\ntdll.dll:
31044.2284: CreationTime: 2015-06-10T18:42:16.781375400Z
41044.2284: LastWriteTime: 2015-05-25T18:21:21.289963400Z
51044.2284: ChangeTime: 2015-06-10T18:48:38.362230200Z
61044.2284: FileAttributes: 0x20
71044.2284: Size: 0x1a61c0
81044.2284: NT Headers: 0xe0
91044.2284: Timestamp: 0x556366f2
101044.2284: Machine: 0x8664 - amd64
111044.2284: Timestamp: 0x556366f2
121044.2284: Image Version: 6.1
131044.2284: SizeOfImage: 0x1a9000 (1740800)
141044.2284: Resource Dir: 0x14d000 LB 0x5a028
151044.2284: ProductName: Microsoft® Windows® Operating System
161044.2284: ProductVersion: 6.1.7601.18869
171044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
181044.2284: FileDescription: NT Layer DLL
191044.2284: \SystemRoot\System32\kernel32.dll:
201044.2284: CreationTime: 2015-06-10T18:42:17.138375400Z
211044.2284: LastWriteTime: 2015-05-25T18:19:02.585000000Z
221044.2284: ChangeTime: 2015-06-10T18:48:38.580631600Z
231044.2284: FileAttributes: 0x20
241044.2284: Size: 0x11be00
251044.2284: NT Headers: 0xe8
261044.2284: Timestamp: 0x556366fc
271044.2284: Machine: 0x8664 - amd64
281044.2284: Timestamp: 0x556366fc
291044.2284: Image Version: 6.1
301044.2284: SizeOfImage: 0x11f000 (1175552)
311044.2284: Resource Dir: 0x116000 LB 0x528
321044.2284: ProductName: Microsoft® Windows® Operating System
331044.2284: ProductVersion: 6.1.7601.18869
341044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
351044.2284: FileDescription: Windows NT BASE API Client DLL
361044.2284: \SystemRoot\System32\KernelBase.dll:
371044.2284: CreationTime: 2015-06-10T18:42:17.269375400Z
381044.2284: LastWriteTime: 2015-05-25T18:19:02.585000000Z
391044.2284: ChangeTime: 2015-06-10T18:48:38.580631600Z
401044.2284: FileAttributes: 0x20
411044.2284: Size: 0x67c00
421044.2284: NT Headers: 0xe8
431044.2284: Timestamp: 0x556366fd
441044.2284: Machine: 0x8664 - amd64
451044.2284: Timestamp: 0x556366fd
461044.2284: Image Version: 6.1
471044.2284: SizeOfImage: 0x6c000 (442368)
481044.2284: Resource Dir: 0x6a000 LB 0x530
491044.2284: ProductName: Microsoft® Windows® Operating System
501044.2284: ProductVersion: 6.1.7601.18869
511044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
521044.2284: FileDescription: Windows NT BASE API Client DLL
531044.2284: \SystemRoot\System32\apisetschema.dll:
541044.2284: CreationTime: 2015-06-10T18:42:15.515375400Z
551044.2284: LastWriteTime: 2015-05-25T18:11:40.254000000Z
561044.2284: ChangeTime: 2015-06-10T18:48:38.346630100Z
571044.2284: FileAttributes: 0x20
581044.2284: Size: 0x1a00
591044.2284: NT Headers: 0xc0
601044.2284: Timestamp: 0x55636622
611044.2284: Machine: 0x8664 - amd64
621044.2284: Timestamp: 0x55636622
631044.2284: Image Version: 6.1
641044.2284: SizeOfImage: 0x50000 (327680)
651044.2284: Resource Dir: 0x30000 LB 0x3f8
661044.2284: ProductName: Microsoft® Windows® Operating System
671044.2284: ProductVersion: 6.1.7601.18869
681044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
691044.2284: FileDescription: ApiSet Schema DLL
701044.2284: NtOpenDirectoryObject failed on \Driver: 0xc0000022
711044.2284: supR3HardenedWinFindAdversaries: 0x3
721044.2284: \SystemRoot\System32\drivers\SysPlant.sys:
731044.2284: CreationTime: 2015-03-02T12:53:04.246699300Z
741044.2284: LastWriteTime: 2015-03-02T12:53:04.246699300Z
751044.2284: ChangeTime: 2015-03-02T12:53:04.246699300Z
761044.2284: FileAttributes: 0x20
771044.2284: Size: 0x26ef0
781044.2284: NT Headers: 0xf8
791044.2284: Timestamp: 0x51a0ec2d
801044.2284: Machine: 0x8664 - amd64
811044.2284: Timestamp: 0x51a0ec2d
821044.2284: Image Version: 5.0
831044.2284: SizeOfImage: 0x2f000 (192512)
841044.2284: Resource Dir: 0x2d000 LB 0x490
851044.2284: ProductName: Symantec CMC Firewall
861044.2284: ProductVersion: 12.1.3001.165
871044.2284: FileVersion: 12.1.3001.165
881044.2284: FileDescription: Symantec CMC Firewall SysPlant
891044.2284: \SystemRoot\System32\sysfer.dll:
901044.2284: CreationTime: 2015-03-02T12:53:04.215499200Z
911044.2284: LastWriteTime: 2015-03-02T12:53:04.215499200Z
921044.2284: ChangeTime: 2015-03-02T12:53:04.215499200Z
931044.2284: FileAttributes: 0x20
941044.2284: Size: 0x70190
951044.2284: NT Headers: 0xe8
961044.2284: Timestamp: 0x51a0ecb5
971044.2284: Machine: 0x8664 - amd64
981044.2284: Timestamp: 0x51a0ecb5
991044.2284: Image Version: 0.0
1001044.2284: SizeOfImage: 0x87000 (552960)
1011044.2284: Resource Dir: 0x85000 LB 0x628
1021044.2284: ProductName: Symantec CMC Firewall
1031044.2284: ProductVersion: 12.1.3001.165
1041044.2284: FileVersion: 12.1.3001.165
1051044.2284: FileDescription: Symantec CMC Firewall sysfer
1061044.2284: \SystemRoot\System32\sysferThunk.dll:
1071044.2284: CreationTime: 2015-03-02T12:53:04.231099300Z
1081044.2284: LastWriteTime: 2015-03-02T12:53:04.231099300Z
1091044.2284: ChangeTime: 2015-03-02T12:53:04.231099300Z
1101044.2284: FileAttributes: 0x20
1111044.2284: Size: 0x2f90
1121044.2284: NT Headers: 0xd0
1131044.2284: Timestamp: 0x51a0ecb6
1141044.2284: Machine: 0x8664 - amd64
1151044.2284: Timestamp: 0x51a0ecb6
1161044.2284: Image Version: 0.0
1171044.2284: SizeOfImage: 0x8000 (32768)
1181044.2284: Resource Dir: 0x6000 LB 0x640
1191044.2284: ProductName: Symantec CMC Firewall
1201044.2284: ProductVersion: 12.1.3001.165
1211044.2284: FileVersion: 12.1.3001.165
1221044.2284: FileDescription: Symantec CMC Firewall SysferThunk
1231044.2284: \SystemRoot\System32\drivers\symevent64x86.sys:
1241044.2284: CreationTime: 2015-03-02T12:53:31.921147900Z
1251044.2284: LastWriteTime: 2015-03-02T12:53:31.921147900Z
1261044.2284: ChangeTime: 2015-03-02T12:53:31.921147900Z
1271044.2284: FileAttributes: 0x20
1281044.2284: Size: 0x2b4a0
1291044.2284: NT Headers: 0xe8
1301044.2284: Timestamp: 0x50346f1e
1311044.2284: Machine: 0x8664 - amd64
1321044.2284: Timestamp: 0x50346f1e
1331044.2284: Image Version: 6.0
1341044.2284: SizeOfImage: 0x38000 (229376)
1351044.2284: Resource Dir: 0x36000 LB 0x3c8
1361044.2284: ProductName: SYMEVENT
1371044.2284: ProductVersion: 12.9.3.1
1381044.2284: FileVersion: 12.9.3.1
1391044.2284: FileDescription: Symantec Event Library
1401044.2284: Calling main()
1411044.2284: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
1421044.2284: SUPR3HardenedMain: Respawn #1
1431044.2284: System32: \Device\HarddiskVolume1\Windows\System32
1441044.2284: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
1451044.2284: KnownDllPath: C:\Windows\system32
1461044.2284: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
1471044.2284: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
1481044.2284: supR3HardNtEnableThreadCreation:
1491044.2284: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00000000772fb780 pvNtTerminateThread=000000007731e0e0
1501044.2284: supR3HardenedWinDoReSpawn(1): New child 2160.2164 [kernel32].
1511044.2284: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd7000 cbPeb=0x380
1521044.2284: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00000000772d0000 uNtDllChildAddr=00000000772d0000
1531044.2284: supR3HardenedWinSetupChildInit: uLdrInitThunk=00000000772fb780
1541044.2284: supR3HardenedWinSetupChildInit: Start child.
1551044.2284: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
1561044.2284: supR3HardNtChildPurify: Startup delay kludge #1/0: 513 ms, 64 sleeps
1571044.2284: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
1581044.2284: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
1591044.2284: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
1601044.2284: *0000000000030000-0000000000027fff 0x0040/0x0040 0x0020000 !!
1611044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000030000 (LB 0x8000, 0000000000030000 LB 0x8000)
1621044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000030000/0000000000030000 LB 0/0x8000]
1631044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000030000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
1641044.2284: 0000000000038000-000000000002ffff 0x0001/0x0000 0x0000000
1651044.2284: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000
1661044.2284: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000
1671044.2284: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000
1681044.2284: 0000000000051000-0000000000041fff 0x0001/0x0000 0x0000000
1691044.2284: *0000000000060000-000000000005efff 0x0040/0x0040 0x0020000 !!
1701044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000)
1711044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000]
1721044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x130000 s=0x10000 ap=0x0 rp=0x00000000000001
1731044.2284: 0000000000061000-fffffffffff31fff 0x0001/0x0000 0x0000000
1741044.2284: *0000000000190000-0000000000093fff 0x0000/0x0004 0x0020000
1751044.2284: 000000000028c000-0000000000288fff 0x0104/0x0004 0x0020000
1761044.2284: 000000000028f000-000000000028dfff 0x0004/0x0004 0x0020000
1771044.2284: 0000000000290000-ffffffff8924ffff 0x0001/0x0000 0x0000000
1781044.2284: *00000000772d0000-00000000772d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1791044.2284: 00000000772d1000-00000000773cefff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1801044.2284: 00000000773cf000-00000000773fdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1811044.2284: 00000000773fe000-0000000077405fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1821044.2284: 0000000077406000-0000000077406fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1831044.2284: 0000000077407000-0000000077409fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1841044.2284: 000000007740a000-0000000077478fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1851044.2284: 0000000077479000-000000006f911fff 0x0001/0x0000 0x0000000
1861044.2284: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
1871044.2284: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
1881044.2284: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
1891044.2284: 000000007fff0000-ffffffffc03effff 0x0001/0x0000 0x0000000
1901044.2284: *000000013fbf0000-000000013fbf0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1911044.2284: 000000013fbf1000-000000013fc75fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1921044.2284: 000000013fc76000-000000013fc76fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1931044.2284: 000000013fc77000-000000013fcb4fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1941044.2284: 000000013fcb5000-000000013fcb5fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1951044.2284: 000000013fcb6000-000000013fcb6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1961044.2284: 000000013fcb7000-000000013fcb8fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1971044.2284: 000000013fcb9000-000000013fcb9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1981044.2284: 000000013fcba000-000000013fcbafff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1991044.2284: 000000013fcbb000-000000013fcbefff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2001044.2284: 000000013fcbf000-000000013fcf7fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2011044.2284: 000000013fcf8000-000000013fceffff 0x0001/0x0000 0x0000000
2021044.2284: *000000013fd00000-000000013fcfefff 0x0040/0x0040 0x0020000 !!
2031044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fd00000 (LB 0x1000, 000000013fd00000 LB 0x1000)
2041044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fd00000/000000013fd00000 LB 0/0x1000]
2051044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fd00000 LB 0x7fdbf8f0000 s=0x10000 ap=0x0 rp=0x00000000000001
2061044.2284: 000000013fd01000-fffff80380411fff 0x0001/0x0000 0x0000000
2071044.2284: *000007feff5f0000-000007feff5f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
2081044.2284: 000007feff5f1000-000007fdfec31fff 0x0001/0x0000 0x0000000
2091044.2284: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
2101044.2284: 000007fffffd3000-000007fffffcefff 0x0001/0x0000 0x0000000
2111044.2284: *000007fffffd7000-000007fffffd5fff 0x0004/0x0004 0x0020000
2121044.2284: 000007fffffd8000-000007fffffd1fff 0x0001/0x0000 0x0000000
2131044.2284: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
2141044.2284: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
2151044.2284: apisetschema.dll: timestamp 0x55636622 (rc=VINF_SUCCESS)
2161044.2284: VirtualBox.exe: timestamp 0x555369a5 (rc=VINF_SUCCESS)
2171044.2284: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
2181044.2284: VirtualBox.exe: Differences in section #0 (headers) between file and memory:
2191044.2284: 000000013fbf016a / 0x000016a: 00 != 11
2201044.2284: 000000013fbf016c / 0x000016c: 00 != cc
2211044.2284: 000000013fbf016d / 0x000016d: 00 != 01
2221044.2284: 000000013fbf01c0 / 0x00001c0: 00 != cc
2231044.2284: 000000013fbf01c1 / 0x00001c1: 00 != 01
2241044.2284: 000000013fbf01c2 / 0x00001c2: 00 != 11
2251044.2284: 000000013fbf01c4 / 0x00001c4: 00 != 20
2261044.2284: Restored 0x400 bytes of original file content at 000000013fbf0000
2271044.2284: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports
2281044.2284: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
2291044.2284: supR3HardNtChildPurify: cFixes=4 g_fSupAdversaries=0x3 cPatchCount=0
2301044.2284: supR3HardNtChildPurify: Startup delay kludge #1/1: 520 ms, 65 sleeps
2311044.2284: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
2321044.2284: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
2331044.2284: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
2341044.2284: 0000000000030000-000000000001ffff 0x0001/0x0000 0x0000000
2351044.2284: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000
2361044.2284: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000
2371044.2284: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000
2381044.2284: 0000000000051000-fffffffffff11fff 0x0001/0x0000 0x0000000
2391044.2284: *0000000000190000-0000000000093fff 0x0000/0x0004 0x0020000
2401044.2284: 000000000028c000-0000000000288fff 0x0104/0x0004 0x0020000
2411044.2284: 000000000028f000-000000000028dfff 0x0004/0x0004 0x0020000
2421044.2284: 0000000000290000-ffffffff8924ffff 0x0001/0x0000 0x0000000
2431044.2284: *00000000772d0000-00000000772d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2441044.2284: 00000000772d1000-00000000773cefff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2451044.2284: 00000000773cf000-00000000773fdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2461044.2284: 00000000773fe000-0000000077405fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2471044.2284: 0000000077406000-0000000077406fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2481044.2284: 0000000077407000-0000000077407fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2491044.2284: 0000000077408000-0000000077409fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2501044.2284: 000000007740a000-0000000077478fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
2511044.2284: 0000000077479000-000000006f911fff 0x0001/0x0000 0x0000000
2521044.2284: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
2531044.2284: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
2541044.2284: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
2551044.2284: 000000007fff0000-ffffffffc03effff 0x0001/0x0000 0x0000000
2561044.2284: *000000013fbf0000-000000013fbf0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2571044.2284: 000000013fbf1000-000000013fc75fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2581044.2284: 000000013fc76000-000000013fc76fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2591044.2284: 000000013fc77000-000000013fcb4fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2601044.2284: 000000013fcb5000-000000013fcbefff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2611044.2284: 000000013fcbf000-000000013fcf7fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2621044.2284: 000000013fcf8000-fffff803803fffff 0x0001/0x0000 0x0000000
2631044.2284: *000007feff5f0000-000007feff5f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
2641044.2284: 000007feff5f1000-000007fdfec31fff 0x0001/0x0000 0x0000000
2651044.2284: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
2661044.2284: 000007fffffd3000-000007fffffcefff 0x0001/0x0000 0x0000000
2671044.2284: *000007fffffd7000-000007fffffd5fff 0x0004/0x0004 0x0020000
2681044.2284: 000007fffffd8000-000007fffffd1fff 0x0001/0x0000 0x0000000
2691044.2284: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
2701044.2284: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
2711044.2284: supR3HardNtChildPurify: Done after 1070 ms and 4 fixes (loop #1).
2721044.2284: supR3HardNtEnableThreadCreation:
2732160.2164: Log file opened: 4.3.28r100309 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db110
2742160.2164: supR3HardenedVmProcessInit: uNtDllAddr=00000000772d0000
2752160.2164: ntdll.dll: timestamp 0x556366f2 (rc=VINF_SUCCESS)
2762160.2164: New simple heap: #1 0000000000290000 LB 0x400000 (for 1740800 allocation)
2772160.2164: System32: \Device\HarddiskVolume1\Windows\System32
2782160.2164: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
2792160.2164: KnownDllPath: C:\Windows\system32
2802160.2164: supR3HardenedVmProcessInit: Opening vboxdrv stub...
2812160.2164: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
2822160.2164: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
2832160.2164: Registered Dll notification callback with NTDLL.
2842160.2164: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll)
2852160.2164: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll
2862160.2164: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling]
2872160.2164: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2882160.2164: supR3HardenedDllNotificationCallback: load 00000000771b0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0]
2892160.2164: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2902160.2164: supR3HardenedDllNotificationCallback: load 000007fefd0b0000 LB 0x0006c000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0]
2912160.2164: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll)
2922160.2164: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
2932160.2164: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00000000771b0000 'C:\Windows\system32\kernel32.dll'
2941044.2284: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 1567 ms, CloseEvents);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy