VirtualBox

Ticket #13659: VBoxHardening.log

File VBoxHardening.log, 25.0 KB (added by Robert Fernando, 7 years ago)

vbxox log taken from samsung laptop with i7 cpu

Line 
1658.2624: Log file opened: 5.1.22r115126 g_hStartupLog=000000000000024c g_uNtVerCombined=0x611db110
2658.2624: \SystemRoot\System32\ntdll.dll:
3658.2624: CreationTime: 2017-05-15T11:40:24.977655900Z
4658.2624: LastWriteTime: 2017-04-28T01:11:49.878278200Z
5658.2624: ChangeTime: 2017-05-15T11:48:18.514070200Z
6658.2624: FileAttributes: 0x20
7658.2624: Size: 0x1a7100
8658.2624: NT Headers: 0xe0
9658.2624: Timestamp: 0x590296ce
10658.2624: Machine: 0x8664 - amd64
11658.2624: Timestamp: 0x590296ce
12658.2624: Image Version: 6.1
13658.2624: SizeOfImage: 0x1aa000 (1744896)
14658.2624: Resource Dir: 0x14e000 LB 0x5a028
15658.2624: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)]
16658.2624: [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)]
17658.2624: ProductName: Microsoft® Windows® Operating System
18658.2624: ProductVersion: 6.1.7601.23796
19658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
20658.2624: FileDescription: NT Layer DLL
21658.2624: \SystemRoot\System32\kernel32.dll:
22658.2624: CreationTime: 2017-05-15T11:40:25.367655900Z
23658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z
24658.2624: ChangeTime: 2017-05-15T11:48:23.818079600Z
25658.2624: FileAttributes: 0x20
26658.2624: Size: 0x11c000
27658.2624: NT Headers: 0xe0
28658.2624: Timestamp: 0x59029713
29658.2624: Machine: 0x8664 - amd64
30658.2624: Timestamp: 0x59029713
31658.2624: Image Version: 6.1
32658.2624: SizeOfImage: 0x11f000 (1175552)
33658.2624: Resource Dir: 0x116000 LB 0x528
34658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
35658.2624: [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)]
36658.2624: ProductName: Microsoft® Windows® Operating System
37658.2624: ProductVersion: 6.1.7601.23796
38658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
39658.2624: FileDescription: Windows NT BASE API Client DLL
40658.2624: \SystemRoot\System32\KernelBase.dll:
41658.2624: CreationTime: 2017-05-15T11:40:27.080155900Z
42658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z
43658.2624: ChangeTime: 2017-05-15T11:48:23.849279600Z
44658.2624: FileAttributes: 0x20
45658.2624: Size: 0x66800
46658.2624: NT Headers: 0xe8
47658.2624: Timestamp: 0x59029714
48658.2624: Machine: 0x8664 - amd64
49658.2624: Timestamp: 0x59029714
50658.2624: Image Version: 6.1
51658.2624: SizeOfImage: 0x6a000 (434176)
52658.2624: Resource Dir: 0x68000 LB 0x530
53658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
54658.2624: [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)]
55658.2624: ProductName: Microsoft® Windows® Operating System
56658.2624: ProductVersion: 6.1.7601.23796
57658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
58658.2624: FileDescription: Windows NT BASE API Client DLL
59658.2624: \SystemRoot\System32\apisetschema.dll:
60658.2624: CreationTime: 2017-05-15T11:40:28.850155900Z
61658.2624: LastWriteTime: 2017-04-28T01:09:58.126000000Z
62658.2624: ChangeTime: 2017-05-15T11:48:18.233269700Z
63658.2624: FileAttributes: 0x20
64658.2624: Size: 0x1a00
65658.2624: NT Headers: 0xc0
66658.2624: Timestamp: 0x590296af
67658.2624: Machine: 0x8664 - amd64
68658.2624: Timestamp: 0x590296af
69658.2624: Image Version: 6.1
70658.2624: SizeOfImage: 0x50000 (327680)
71658.2624: Resource Dir: 0x30000 LB 0x3f8
72658.2624: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)]
73658.2624: [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)]
74658.2624: ProductName: Microsoft® Windows® Operating System
75658.2624: ProductVersion: 6.1.7601.23796
76658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
77658.2624: FileDescription: ApiSet Schema DLL
78658.2624: Found driver SysPlant (0x1)
79658.2624: Found driver SymNetS (0x2)
80658.2624: Found driver SRTSPX (0x2)
81658.2624: Found driver SymEvent (0x2)
82658.2624: Found driver SymIRON (0x2)
83658.2624: supR3HardenedWinFindAdversaries: 0x3
84658.2624: \SystemRoot\System32\drivers\SysPlant.sys:
85658.2624: CreationTime: 2015-04-08T09:25:06.205658700Z
86658.2624: LastWriteTime: 2015-04-08T09:25:06.205658700Z
87658.2624: ChangeTime: 2015-04-08T09:25:06.205658700Z
88658.2624: FileAttributes: 0x20
89658.2624: Size: 0x26f40
90658.2624: NT Headers: 0x100
91658.2624: Timestamp: 0x5413cb4e
92658.2624: Machine: 0x8664 - amd64
93658.2624: Timestamp: 0x5413cb4e
94658.2624: Image Version: 5.0
95658.2624: SizeOfImage: 0x2d000 (184320)
96658.2624: Resource Dir: 0x2b000 LB 0x498
97658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
98658.2624: [Raw version resource data: 0x2b0b8 LB 0x3e0, codepage 0x4e4 (reserved 0x0)]
99658.2624: ProductName: Symantec CMC Firewall
100658.2624: ProductVersion: 12.1.5337.5000
101658.2624: FileVersion: 12.1.5337.5000
102658.2624: FileDescription: Symantec CMC Firewall SysPlant
103658.2624: \SystemRoot\System32\sysfer.dll:
104658.2624: CreationTime: 2015-04-08T09:25:06.200658700Z
105658.2624: LastWriteTime: 2015-04-08T09:25:06.200658700Z
106658.2624: ChangeTime: 2015-04-08T09:25:06.200658700Z
107658.2624: FileAttributes: 0x20
108658.2624: Size: 0x70f60
109658.2624: NT Headers: 0xe8
110658.2624: Timestamp: 0x5413cb55
111658.2624: Machine: 0x8664 - amd64
112658.2624: Timestamp: 0x5413cb55
113658.2624: Image Version: 0.0
114658.2624: SizeOfImage: 0x88000 (557056)
115658.2624: Resource Dir: 0x86000 LB 0x630
116658.2624: [Version info resource found at 0xc8! (ID/Name: 0x1; SubID/SubName: 0x409)]
117658.2624: [Raw version resource data: 0x86100 LB 0x3d4, codepage 0x4e4 (reserved 0x0)]
118658.2624: ProductName: Symantec CMC Firewall
119658.2624: ProductVersion: 12.1.5337.5000
120658.2624: FileVersion: 12.1.5337.5000
121658.2624: FileDescription: Symantec CMC Firewall sysfer
122658.2624: \SystemRoot\System32\drivers\symevent64x86.sys:
123658.2624: CreationTime: 2015-04-08T09:25:49.025658700Z
124658.2624: LastWriteTime: 2015-06-02T08:16:03.334057100Z
125658.2624: ChangeTime: 2015-06-02T08:16:03.334057100Z
126658.2624: FileAttributes: 0x20
127658.2624: Size: 0x2b658
128658.2624: NT Headers: 0xe8
129658.2624: Timestamp: 0x51f32ff2
130658.2624: Machine: 0x8664 - amd64
131658.2624: Timestamp: 0x51f32ff2
132658.2624: Image Version: 6.0
133658.2624: SizeOfImage: 0x38000 (229376)
134658.2624: Resource Dir: 0x36000 LB 0x3c8
135658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
136658.2624: [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)]
137658.2624: ProductName: SYMEVENT
138658.2624: ProductVersion: 12.9.5.2
139658.2624: FileVersion: 12.9.5.2
140658.2624: FileDescription: Symantec Event Library
141658.2624: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
142658.2624: Calling main()
143658.2624: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
144658.2624: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
145658.2624: SUPR3HardenedMain: Respawn #1
146658.2624: System32: \Device\HarddiskVolume2\Windows\System32
147658.2624: WinSxS: \Device\HarddiskVolume2\Windows\winsxs
148658.2624: KnownDllPath: C:\Windows\system32
149658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
150658.2624: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
151658.2624: supR3HardNtEnableThreadCreation:
152658.2624: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f3a360 pvNtTerminateThread=0000000076f5c260
153658.2624: supR3HardenedWinDoReSpawn(1): New child 15a4.5e8 [kernel32].
154658.2624: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdf000 cbPeb=0x380
155658.2624: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f10000 uNtDllChildAddr=0000000076f10000
156658.2624: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f3a360
157658.2624: supR3HardenedWinSetupChildInit: Start child.
158658.2624: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
159658.2624: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps
160658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
161658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000
162658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000
163658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000
164658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000
165658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000
166658.2624: 0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000
167658.2624: *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !!
168658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000)
169658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000]
170658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x1c0000 s=0x10000 ap=0x0 rp=0x00000000000001
171658.2624: 0000000000061000-000000000021ffff 0x0001/0x0000 0x0000000
172658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000
173658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000
174658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000
175658.2624: 0000000000320000-0000000071a9ffff 0x0001/0x0000 0x0000000
176658.2624: *0000000071aa0000-0000000071aa0fff 0x0040/0x0040 0x0020000 !!
177658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071aa0000 (LB 0x1000, 0000000071aa0000 LB 0x1000)
178658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071aa0000/0000000071aa0000 LB 0/0x1000]
179658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071aa0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
180658.2624: 0000000071aa1000-0000000071aaffff 0x0001/0x0000 0x0000000
181658.2624: *0000000071ab0000-0000000071ab0fff 0x0040/0x0040 0x0020000 !!
182658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ab0000 (LB 0x1000, 0000000071ab0000 LB 0x1000)
183658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ab0000/0000000071ab0000 LB 0/0x1000]
184658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ab0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
185658.2624: 0000000071ab1000-0000000071abffff 0x0001/0x0000 0x0000000
186658.2624: *0000000071ac0000-0000000071ac0fff 0x0040/0x0040 0x0020000 !!
187658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ac0000 (LB 0x1000, 0000000071ac0000 LB 0x1000)
188658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ac0000/0000000071ac0000 LB 0/0x1000]
189658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ac0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
190658.2624: 0000000071ac1000-0000000071acffff 0x0001/0x0000 0x0000000
191658.2624: *0000000071ad0000-0000000071ad0fff 0x0040/0x0040 0x0020000 !!
192658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ad0000 (LB 0x1000, 0000000071ad0000 LB 0x1000)
193658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ad0000/0000000071ad0000 LB 0/0x1000]
194658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ad0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
195658.2624: 0000000071ad1000-0000000071adffff 0x0001/0x0000 0x0000000
196658.2624: *0000000071ae0000-0000000071ae0fff 0x0040/0x0040 0x0020000 !!
197658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ae0000 (LB 0x1000, 0000000071ae0000 LB 0x1000)
198658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ae0000/0000000071ae0000 LB 0/0x1000]
199658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ae0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
200658.2624: 0000000071ae1000-0000000071aeffff 0x0001/0x0000 0x0000000
201658.2624: *0000000071af0000-0000000071af0fff 0x0040/0x0040 0x0020000 !!
202658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071af0000 (LB 0x1000, 0000000071af0000 LB 0x1000)
203658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071af0000/0000000071af0000 LB 0/0x1000]
204658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071af0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
205658.2624: 0000000071af1000-0000000071afffff 0x0001/0x0000 0x0000000
206658.2624: *0000000071b00000-0000000071b00fff 0x0040/0x0040 0x0020000 !!
207658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071b00000 (LB 0x1000, 0000000071b00000 LB 0x1000)
208658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071b00000/0000000071b00000 LB 0/0x1000]
209658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071b00000 LB 0x5410000 s=0x10000 ap=0x0 rp=0x00000000000001
210658.2624: 0000000071b01000-0000000076f0ffff 0x0001/0x0000 0x0000000
211658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
212658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
213658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
214658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
215658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
216658.2624: 0000000077048000-000000007704afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
217658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
218658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000
219658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000
220658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
221658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
222658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000
223658.2624: *000000013fde0000-000000013fde0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
224658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
225658.2624: 000000013fe51000-000000013fe51fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
226658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
227658.2624: 000000013fe97000-000000013fe97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
228658.2624: 000000013fe98000-000000013fe98fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
229658.2624: 000000013fe99000-000000013fe9dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
230658.2624: 000000013fe9e000-000000013fe9efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
231658.2624: 000000013fe9f000-000000013fe9ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
232658.2624: 000000013fea0000-000000013fea3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
233658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
234658.2624: 000000013feec000-000000013feeffff 0x0001/0x0000 0x0000000
235658.2624: *000000013fef0000-000000013fef0fff 0x0040/0x0040 0x0020000 !!
236658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fef0000 (LB 0x1000, 000000013fef0000 LB 0x1000)
237658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fef0000/000000013fef0000 LB 0/0x1000]
238658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fef0000 LB 0x7fdbf340000 s=0x10000 ap=0x0 rp=0x00000000000001
239658.2624: 000000013fef1000-000007feff22ffff 0x0001/0x0000 0x0000000
240658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll
241658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000
242658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000
243658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000
244658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000
245658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000
246658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000
247658.2624: apisetschema.dll: timestamp 0x590296af (rc=VINF_SUCCESS)
248658.2624: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS)
249658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
250658.2624: VirtualBox.exe: Differences in section #0 (headers) between file and memory:
251658.2624: 000000013fde0162 / 0x0000162: 00 != 11
252658.2624: 000000013fde0164 / 0x0000164: 00 != b8
253658.2624: 000000013fde0165 / 0x0000165: 00 != 01
254658.2624: 000000013fde01b8 / 0x00001b8: 00 != b8
255658.2624: 000000013fde01b9 / 0x00001b9: 00 != 01
256658.2624: 000000013fde01ba / 0x00001ba: 00 != 11
257658.2624: 000000013fde01bc / 0x00001bc: 00 != 20
258658.2624: Restored 0x400 bytes of original file content at 000000013fde0000
259658.2624: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports
260658.2624: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports
261658.2624: ntdll.dll: Differences in section #1 (.text) between file and memory:
262658.2624: 0000000076f5d540 / 0x004d540: 4c != e9
263658.2624: 0000000076f5d541 / 0x004d541: 8b != bb
264658.2624: 0000000076f5d542 / 0x004d542: d1 != 2a
265658.2624: 0000000076f5d543 / 0x004d543: b8 != b4
266658.2624: 0000000076f5d544 / 0x004d544: 7e != fa
267658.2624: Restored 0x2000 bytes of original file content at 0000000076f5c36e
268658.2624: supR3HardNtChildPurify: cFixes=11 g_fSupAdversaries=0x3 cPatchCount=0
269658.2624: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps
270658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
271658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000
272658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000
273658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000
274658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000
275658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000
276658.2624: 0000000000041000-000000000021ffff 0x0001/0x0000 0x0000000
277658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000
278658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000
279658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000
280658.2624: 0000000000320000-0000000076f0ffff 0x0001/0x0000 0x0000000
281658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
282658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
283658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
284658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
285658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
286658.2624: 0000000077048000-0000000077048fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
287658.2624: 0000000077049000-000000007704afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
288658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
289658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000
290658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000
291658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
292658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
293658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000
294658.2624: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
295658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
296658.2624: 000000013fe51000-000000013fe51fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
297658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
298658.2624: 000000013fe97000-000000013fea3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
299658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
300658.2624: 000000013feec000-000007feff22ffff 0x0001/0x0000 0x0000000
301658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll
302658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000
303658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000
304658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000
305658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000
306658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000
307658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000
308658.2624: supR3HardNtChildPurify: Done after 4786 ms and 11 fixes (loop #1).
309658.2624: supR3HardNtEnableThreadCreation:
31015a4.5e8: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100
31115a4.5e8: supR3HardenedVmProcessInit: uNtDllAddr=0000000076f10000 g_uNtVerCombined=0x611db100
31215a4.5e8: ntdll.dll: timestamp 0x590296ce (rc=VINF_SUCCESS)
31315a4.5e8: New simple heap: #1 0000000000320000 LB 0x400000 (for 1744896 allocation)
31415a4.5e8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
31515a4.5e8: System32: \Device\HarddiskVolume2\Windows\System32
31615a4.5e8: WinSxS: \Device\HarddiskVolume2\Windows\winsxs
31715a4.5e8: KnownDllPath: C:\Windows\system32
31815a4.5e8: supR3HardenedVmProcessInit: Opening vboxdrv stub...
31915a4.5e8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
32015a4.5e8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
32115a4.5e8: Registered Dll notification callback with NTDLL.
32215a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll)
32315a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll
32415a4.5e8: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling]
32515a4.5e8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
32615a4.5e8: supR3HardenedDllNotificationCallback: load 0000000076df0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0]
32715a4.5e8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
32815a4.5e8: supR3HardenedDllNotificationCallback: load 000007fefcc60000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0]
32915a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll)
33015a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
33115a4.5e8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076df0000 'C:\Windows\system32\kernel32.dll'
332658.2624: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 796 ms, CloseEvents);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy