| 1 | 658.2624: Log file opened: 5.1.22r115126 g_hStartupLog=000000000000024c g_uNtVerCombined=0x611db110
|
|---|
| 2 | 658.2624: \SystemRoot\System32\ntdll.dll:
|
|---|
| 3 | 658.2624: CreationTime: 2017-05-15T11:40:24.977655900Z
|
|---|
| 4 | 658.2624: LastWriteTime: 2017-04-28T01:11:49.878278200Z
|
|---|
| 5 | 658.2624: ChangeTime: 2017-05-15T11:48:18.514070200Z
|
|---|
| 6 | 658.2624: FileAttributes: 0x20
|
|---|
| 7 | 658.2624: Size: 0x1a7100
|
|---|
| 8 | 658.2624: NT Headers: 0xe0
|
|---|
| 9 | 658.2624: Timestamp: 0x590296ce
|
|---|
| 10 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 11 | 658.2624: Timestamp: 0x590296ce
|
|---|
| 12 | 658.2624: Image Version: 6.1
|
|---|
| 13 | 658.2624: SizeOfImage: 0x1aa000 (1744896)
|
|---|
| 14 | 658.2624: Resource Dir: 0x14e000 LB 0x5a028
|
|---|
| 15 | 658.2624: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 16 | 658.2624: [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)]
|
|---|
| 17 | 658.2624: ProductName: Microsoft® Windows® Operating System
|
|---|
| 18 | 658.2624: ProductVersion: 6.1.7601.23796
|
|---|
| 19 | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
|
|---|
| 20 | 658.2624: FileDescription: NT Layer DLL
|
|---|
| 21 | 658.2624: \SystemRoot\System32\kernel32.dll:
|
|---|
| 22 | 658.2624: CreationTime: 2017-05-15T11:40:25.367655900Z
|
|---|
| 23 | 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z
|
|---|
| 24 | 658.2624: ChangeTime: 2017-05-15T11:48:23.818079600Z
|
|---|
| 25 | 658.2624: FileAttributes: 0x20
|
|---|
| 26 | 658.2624: Size: 0x11c000
|
|---|
| 27 | 658.2624: NT Headers: 0xe0
|
|---|
| 28 | 658.2624: Timestamp: 0x59029713
|
|---|
| 29 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 30 | 658.2624: Timestamp: 0x59029713
|
|---|
| 31 | 658.2624: Image Version: 6.1
|
|---|
| 32 | 658.2624: SizeOfImage: 0x11f000 (1175552)
|
|---|
| 33 | 658.2624: Resource Dir: 0x116000 LB 0x528
|
|---|
| 34 | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 35 | 658.2624: [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)]
|
|---|
| 36 | 658.2624: ProductName: Microsoft® Windows® Operating System
|
|---|
| 37 | 658.2624: ProductVersion: 6.1.7601.23796
|
|---|
| 38 | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
|
|---|
| 39 | 658.2624: FileDescription: Windows NT BASE API Client DLL
|
|---|
| 40 | 658.2624: \SystemRoot\System32\KernelBase.dll:
|
|---|
| 41 | 658.2624: CreationTime: 2017-05-15T11:40:27.080155900Z
|
|---|
| 42 | 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z
|
|---|
| 43 | 658.2624: ChangeTime: 2017-05-15T11:48:23.849279600Z
|
|---|
| 44 | 658.2624: FileAttributes: 0x20
|
|---|
| 45 | 658.2624: Size: 0x66800
|
|---|
| 46 | 658.2624: NT Headers: 0xe8
|
|---|
| 47 | 658.2624: Timestamp: 0x59029714
|
|---|
| 48 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 49 | 658.2624: Timestamp: 0x59029714
|
|---|
| 50 | 658.2624: Image Version: 6.1
|
|---|
| 51 | 658.2624: SizeOfImage: 0x6a000 (434176)
|
|---|
| 52 | 658.2624: Resource Dir: 0x68000 LB 0x530
|
|---|
| 53 | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 54 | 658.2624: [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)]
|
|---|
| 55 | 658.2624: ProductName: Microsoft® Windows® Operating System
|
|---|
| 56 | 658.2624: ProductVersion: 6.1.7601.23796
|
|---|
| 57 | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
|
|---|
| 58 | 658.2624: FileDescription: Windows NT BASE API Client DLL
|
|---|
| 59 | 658.2624: \SystemRoot\System32\apisetschema.dll:
|
|---|
| 60 | 658.2624: CreationTime: 2017-05-15T11:40:28.850155900Z
|
|---|
| 61 | 658.2624: LastWriteTime: 2017-04-28T01:09:58.126000000Z
|
|---|
| 62 | 658.2624: ChangeTime: 2017-05-15T11:48:18.233269700Z
|
|---|
| 63 | 658.2624: FileAttributes: 0x20
|
|---|
| 64 | 658.2624: Size: 0x1a00
|
|---|
| 65 | 658.2624: NT Headers: 0xc0
|
|---|
| 66 | 658.2624: Timestamp: 0x590296af
|
|---|
| 67 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 68 | 658.2624: Timestamp: 0x590296af
|
|---|
| 69 | 658.2624: Image Version: 6.1
|
|---|
| 70 | 658.2624: SizeOfImage: 0x50000 (327680)
|
|---|
| 71 | 658.2624: Resource Dir: 0x30000 LB 0x3f8
|
|---|
| 72 | 658.2624: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 73 | 658.2624: [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)]
|
|---|
| 74 | 658.2624: ProductName: Microsoft® Windows® Operating System
|
|---|
| 75 | 658.2624: ProductVersion: 6.1.7601.23796
|
|---|
| 76 | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518)
|
|---|
| 77 | 658.2624: FileDescription: ApiSet Schema DLL
|
|---|
| 78 | 658.2624: Found driver SysPlant (0x1)
|
|---|
| 79 | 658.2624: Found driver SymNetS (0x2)
|
|---|
| 80 | 658.2624: Found driver SRTSPX (0x2)
|
|---|
| 81 | 658.2624: Found driver SymEvent (0x2)
|
|---|
| 82 | 658.2624: Found driver SymIRON (0x2)
|
|---|
| 83 | 658.2624: supR3HardenedWinFindAdversaries: 0x3
|
|---|
| 84 | 658.2624: \SystemRoot\System32\drivers\SysPlant.sys:
|
|---|
| 85 | 658.2624: CreationTime: 2015-04-08T09:25:06.205658700Z
|
|---|
| 86 | 658.2624: LastWriteTime: 2015-04-08T09:25:06.205658700Z
|
|---|
| 87 | 658.2624: ChangeTime: 2015-04-08T09:25:06.205658700Z
|
|---|
| 88 | 658.2624: FileAttributes: 0x20
|
|---|
| 89 | 658.2624: Size: 0x26f40
|
|---|
| 90 | 658.2624: NT Headers: 0x100
|
|---|
| 91 | 658.2624: Timestamp: 0x5413cb4e
|
|---|
| 92 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 93 | 658.2624: Timestamp: 0x5413cb4e
|
|---|
| 94 | 658.2624: Image Version: 5.0
|
|---|
| 95 | 658.2624: SizeOfImage: 0x2d000 (184320)
|
|---|
| 96 | 658.2624: Resource Dir: 0x2b000 LB 0x498
|
|---|
| 97 | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 98 | 658.2624: [Raw version resource data: 0x2b0b8 LB 0x3e0, codepage 0x4e4 (reserved 0x0)]
|
|---|
| 99 | 658.2624: ProductName: Symantec CMC Firewall
|
|---|
| 100 | 658.2624: ProductVersion: 12.1.5337.5000
|
|---|
| 101 | 658.2624: FileVersion: 12.1.5337.5000
|
|---|
| 102 | 658.2624: FileDescription: Symantec CMC Firewall SysPlant
|
|---|
| 103 | 658.2624: \SystemRoot\System32\sysfer.dll:
|
|---|
| 104 | 658.2624: CreationTime: 2015-04-08T09:25:06.200658700Z
|
|---|
| 105 | 658.2624: LastWriteTime: 2015-04-08T09:25:06.200658700Z
|
|---|
| 106 | 658.2624: ChangeTime: 2015-04-08T09:25:06.200658700Z
|
|---|
| 107 | 658.2624: FileAttributes: 0x20
|
|---|
| 108 | 658.2624: Size: 0x70f60
|
|---|
| 109 | 658.2624: NT Headers: 0xe8
|
|---|
| 110 | 658.2624: Timestamp: 0x5413cb55
|
|---|
| 111 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 112 | 658.2624: Timestamp: 0x5413cb55
|
|---|
| 113 | 658.2624: Image Version: 0.0
|
|---|
| 114 | 658.2624: SizeOfImage: 0x88000 (557056)
|
|---|
| 115 | 658.2624: Resource Dir: 0x86000 LB 0x630
|
|---|
| 116 | 658.2624: [Version info resource found at 0xc8! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 117 | 658.2624: [Raw version resource data: 0x86100 LB 0x3d4, codepage 0x4e4 (reserved 0x0)]
|
|---|
| 118 | 658.2624: ProductName: Symantec CMC Firewall
|
|---|
| 119 | 658.2624: ProductVersion: 12.1.5337.5000
|
|---|
| 120 | 658.2624: FileVersion: 12.1.5337.5000
|
|---|
| 121 | 658.2624: FileDescription: Symantec CMC Firewall sysfer
|
|---|
| 122 | 658.2624: \SystemRoot\System32\drivers\symevent64x86.sys:
|
|---|
| 123 | 658.2624: CreationTime: 2015-04-08T09:25:49.025658700Z
|
|---|
| 124 | 658.2624: LastWriteTime: 2015-06-02T08:16:03.334057100Z
|
|---|
| 125 | 658.2624: ChangeTime: 2015-06-02T08:16:03.334057100Z
|
|---|
| 126 | 658.2624: FileAttributes: 0x20
|
|---|
| 127 | 658.2624: Size: 0x2b658
|
|---|
| 128 | 658.2624: NT Headers: 0xe8
|
|---|
| 129 | 658.2624: Timestamp: 0x51f32ff2
|
|---|
| 130 | 658.2624: Machine: 0x8664 - amd64
|
|---|
| 131 | 658.2624: Timestamp: 0x51f32ff2
|
|---|
| 132 | 658.2624: Image Version: 6.0
|
|---|
| 133 | 658.2624: SizeOfImage: 0x38000 (229376)
|
|---|
| 134 | 658.2624: Resource Dir: 0x36000 LB 0x3c8
|
|---|
| 135 | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
|
|---|
| 136 | 658.2624: [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)]
|
|---|
| 137 | 658.2624: ProductName: SYMEVENT
|
|---|
| 138 | 658.2624: ProductVersion: 12.9.5.2
|
|---|
| 139 | 658.2624: FileVersion: 12.9.5.2
|
|---|
| 140 | 658.2624: FileDescription: Symantec Event Library
|
|---|
| 141 | 658.2624: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
|
|---|
| 142 | 658.2624: Calling main()
|
|---|
| 143 | 658.2624: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
|
|---|
| 144 | 658.2624: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
|
|---|
| 145 | 658.2624: SUPR3HardenedMain: Respawn #1
|
|---|
| 146 | 658.2624: System32: \Device\HarddiskVolume2\Windows\System32
|
|---|
| 147 | 658.2624: WinSxS: \Device\HarddiskVolume2\Windows\winsxs
|
|---|
| 148 | 658.2624: KnownDllPath: C:\Windows\system32
|
|---|
| 149 | 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
|
|---|
| 150 | 658.2624: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
|
|---|
| 151 | 658.2624: supR3HardNtEnableThreadCreation:
|
|---|
| 152 | 658.2624: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f3a360 pvNtTerminateThread=0000000076f5c260
|
|---|
| 153 | 658.2624: supR3HardenedWinDoReSpawn(1): New child 15a4.5e8 [kernel32].
|
|---|
| 154 | 658.2624: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdf000 cbPeb=0x380
|
|---|
| 155 | 658.2624: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f10000 uNtDllChildAddr=0000000076f10000
|
|---|
| 156 | 658.2624: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f3a360
|
|---|
| 157 | 658.2624: supR3HardenedWinSetupChildInit: Start child.
|
|---|
| 158 | 658.2624: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
|
|---|
| 159 | 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps
|
|---|
| 160 | 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
|
|---|
| 161 | 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000
|
|---|
| 162 | 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000
|
|---|
| 163 | 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000
|
|---|
| 164 | 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000
|
|---|
| 165 | 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000
|
|---|
| 166 | 658.2624: 0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000
|
|---|
| 167 | 658.2624: *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 168 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000)
|
|---|
| 169 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000]
|
|---|
| 170 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x1c0000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 171 | 658.2624: 0000000000061000-000000000021ffff 0x0001/0x0000 0x0000000
|
|---|
| 172 | 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000
|
|---|
| 173 | 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000
|
|---|
| 174 | 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000
|
|---|
| 175 | 658.2624: 0000000000320000-0000000071a9ffff 0x0001/0x0000 0x0000000
|
|---|
| 176 | 658.2624: *0000000071aa0000-0000000071aa0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 177 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071aa0000 (LB 0x1000, 0000000071aa0000 LB 0x1000)
|
|---|
| 178 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071aa0000/0000000071aa0000 LB 0/0x1000]
|
|---|
| 179 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071aa0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 180 | 658.2624: 0000000071aa1000-0000000071aaffff 0x0001/0x0000 0x0000000
|
|---|
| 181 | 658.2624: *0000000071ab0000-0000000071ab0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 182 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ab0000 (LB 0x1000, 0000000071ab0000 LB 0x1000)
|
|---|
| 183 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ab0000/0000000071ab0000 LB 0/0x1000]
|
|---|
| 184 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ab0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 185 | 658.2624: 0000000071ab1000-0000000071abffff 0x0001/0x0000 0x0000000
|
|---|
| 186 | 658.2624: *0000000071ac0000-0000000071ac0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 187 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ac0000 (LB 0x1000, 0000000071ac0000 LB 0x1000)
|
|---|
| 188 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ac0000/0000000071ac0000 LB 0/0x1000]
|
|---|
| 189 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ac0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 190 | 658.2624: 0000000071ac1000-0000000071acffff 0x0001/0x0000 0x0000000
|
|---|
| 191 | 658.2624: *0000000071ad0000-0000000071ad0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 192 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ad0000 (LB 0x1000, 0000000071ad0000 LB 0x1000)
|
|---|
| 193 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ad0000/0000000071ad0000 LB 0/0x1000]
|
|---|
| 194 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ad0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 195 | 658.2624: 0000000071ad1000-0000000071adffff 0x0001/0x0000 0x0000000
|
|---|
| 196 | 658.2624: *0000000071ae0000-0000000071ae0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 197 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ae0000 (LB 0x1000, 0000000071ae0000 LB 0x1000)
|
|---|
| 198 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ae0000/0000000071ae0000 LB 0/0x1000]
|
|---|
| 199 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ae0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 200 | 658.2624: 0000000071ae1000-0000000071aeffff 0x0001/0x0000 0x0000000
|
|---|
| 201 | 658.2624: *0000000071af0000-0000000071af0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 202 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071af0000 (LB 0x1000, 0000000071af0000 LB 0x1000)
|
|---|
| 203 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071af0000/0000000071af0000 LB 0/0x1000]
|
|---|
| 204 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071af0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 205 | 658.2624: 0000000071af1000-0000000071afffff 0x0001/0x0000 0x0000000
|
|---|
| 206 | 658.2624: *0000000071b00000-0000000071b00fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 207 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071b00000 (LB 0x1000, 0000000071b00000 LB 0x1000)
|
|---|
| 208 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071b00000/0000000071b00000 LB 0/0x1000]
|
|---|
| 209 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071b00000 LB 0x5410000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 210 | 658.2624: 0000000071b01000-0000000076f0ffff 0x0001/0x0000 0x0000000
|
|---|
| 211 | 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 212 | 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 213 | 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 214 | 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 215 | 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 216 | 658.2624: 0000000077048000-000000007704afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 217 | 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 218 | 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000
|
|---|
| 219 | 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000
|
|---|
| 220 | 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
|
|---|
| 221 | 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
|
|---|
| 222 | 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000
|
|---|
| 223 | 658.2624: *000000013fde0000-000000013fde0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 224 | 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 225 | 658.2624: 000000013fe51000-000000013fe51fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 226 | 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 227 | 658.2624: 000000013fe97000-000000013fe97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 228 | 658.2624: 000000013fe98000-000000013fe98fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 229 | 658.2624: 000000013fe99000-000000013fe9dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 230 | 658.2624: 000000013fe9e000-000000013fe9efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 231 | 658.2624: 000000013fe9f000-000000013fe9ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 232 | 658.2624: 000000013fea0000-000000013fea3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 233 | 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 234 | 658.2624: 000000013feec000-000000013feeffff 0x0001/0x0000 0x0000000
|
|---|
| 235 | 658.2624: *000000013fef0000-000000013fef0fff 0x0040/0x0040 0x0020000 !!
|
|---|
| 236 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fef0000 (LB 0x1000, 000000013fef0000 LB 0x1000)
|
|---|
| 237 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fef0000/000000013fef0000 LB 0/0x1000]
|
|---|
| 238 | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fef0000 LB 0x7fdbf340000 s=0x10000 ap=0x0 rp=0x00000000000001
|
|---|
| 239 | 658.2624: 000000013fef1000-000007feff22ffff 0x0001/0x0000 0x0000000
|
|---|
| 240 | 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll
|
|---|
| 241 | 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000
|
|---|
| 242 | 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000
|
|---|
| 243 | 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000
|
|---|
| 244 | 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000
|
|---|
| 245 | 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000
|
|---|
| 246 | 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000
|
|---|
| 247 | 658.2624: apisetschema.dll: timestamp 0x590296af (rc=VINF_SUCCESS)
|
|---|
| 248 | 658.2624: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS)
|
|---|
| 249 | 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
|
|---|
| 250 | 658.2624: VirtualBox.exe: Differences in section #0 (headers) between file and memory:
|
|---|
| 251 | 658.2624: 000000013fde0162 / 0x0000162: 00 != 11
|
|---|
| 252 | 658.2624: 000000013fde0164 / 0x0000164: 00 != b8
|
|---|
| 253 | 658.2624: 000000013fde0165 / 0x0000165: 00 != 01
|
|---|
| 254 | 658.2624: 000000013fde01b8 / 0x00001b8: 00 != b8
|
|---|
| 255 | 658.2624: 000000013fde01b9 / 0x00001b9: 00 != 01
|
|---|
| 256 | 658.2624: 000000013fde01ba / 0x00001ba: 00 != 11
|
|---|
| 257 | 658.2624: 000000013fde01bc / 0x00001bc: 00 != 20
|
|---|
| 258 | 658.2624: Restored 0x400 bytes of original file content at 000000013fde0000
|
|---|
| 259 | 658.2624: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports
|
|---|
| 260 | 658.2624: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports
|
|---|
| 261 | 658.2624: ntdll.dll: Differences in section #1 (.text) between file and memory:
|
|---|
| 262 | 658.2624: 0000000076f5d540 / 0x004d540: 4c != e9
|
|---|
| 263 | 658.2624: 0000000076f5d541 / 0x004d541: 8b != bb
|
|---|
| 264 | 658.2624: 0000000076f5d542 / 0x004d542: d1 != 2a
|
|---|
| 265 | 658.2624: 0000000076f5d543 / 0x004d543: b8 != b4
|
|---|
| 266 | 658.2624: 0000000076f5d544 / 0x004d544: 7e != fa
|
|---|
| 267 | 658.2624: Restored 0x2000 bytes of original file content at 0000000076f5c36e
|
|---|
| 268 | 658.2624: supR3HardNtChildPurify: cFixes=11 g_fSupAdversaries=0x3 cPatchCount=0
|
|---|
| 269 | 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps
|
|---|
| 270 | 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
|
|---|
| 271 | 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000
|
|---|
| 272 | 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000
|
|---|
| 273 | 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000
|
|---|
| 274 | 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000
|
|---|
| 275 | 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000
|
|---|
| 276 | 658.2624: 0000000000041000-000000000021ffff 0x0001/0x0000 0x0000000
|
|---|
| 277 | 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000
|
|---|
| 278 | 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000
|
|---|
| 279 | 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000
|
|---|
| 280 | 658.2624: 0000000000320000-0000000076f0ffff 0x0001/0x0000 0x0000000
|
|---|
| 281 | 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 282 | 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 283 | 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 284 | 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 285 | 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 286 | 658.2624: 0000000077048000-0000000077048fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 287 | 658.2624: 0000000077049000-000000007704afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 288 | 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
|
|---|
| 289 | 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000
|
|---|
| 290 | 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000
|
|---|
| 291 | 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
|
|---|
| 292 | 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
|
|---|
| 293 | 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000
|
|---|
| 294 | 658.2624: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 295 | 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 296 | 658.2624: 000000013fe51000-000000013fe51fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 297 | 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 298 | 658.2624: 000000013fe97000-000000013fea3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 299 | 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
|
|---|
| 300 | 658.2624: 000000013feec000-000007feff22ffff 0x0001/0x0000 0x0000000
|
|---|
| 301 | 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll
|
|---|
| 302 | 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000
|
|---|
| 303 | 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000
|
|---|
| 304 | 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000
|
|---|
| 305 | 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000
|
|---|
| 306 | 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000
|
|---|
| 307 | 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000
|
|---|
| 308 | 658.2624: supR3HardNtChildPurify: Done after 4786 ms and 11 fixes (loop #1).
|
|---|
| 309 | 658.2624: supR3HardNtEnableThreadCreation:
|
|---|
| 310 | 15a4.5e8: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100
|
|---|
| 311 | 15a4.5e8: supR3HardenedVmProcessInit: uNtDllAddr=0000000076f10000 g_uNtVerCombined=0x611db100
|
|---|
| 312 | 15a4.5e8: ntdll.dll: timestamp 0x590296ce (rc=VINF_SUCCESS)
|
|---|
| 313 | 15a4.5e8: New simple heap: #1 0000000000320000 LB 0x400000 (for 1744896 allocation)
|
|---|
| 314 | 15a4.5e8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
|
|---|
| 315 | 15a4.5e8: System32: \Device\HarddiskVolume2\Windows\System32
|
|---|
| 316 | 15a4.5e8: WinSxS: \Device\HarddiskVolume2\Windows\winsxs
|
|---|
| 317 | 15a4.5e8: KnownDllPath: C:\Windows\system32
|
|---|
| 318 | 15a4.5e8: supR3HardenedVmProcessInit: Opening vboxdrv stub...
|
|---|
| 319 | 15a4.5e8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
|
|---|
| 320 | 15a4.5e8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
|
|---|
| 321 | 15a4.5e8: Registered Dll notification callback with NTDLL.
|
|---|
| 322 | 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll)
|
|---|
| 323 | 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll
|
|---|
| 324 | 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling]
|
|---|
| 325 | 15a4.5e8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
|
|---|
| 326 | 15a4.5e8: supR3HardenedDllNotificationCallback: load 0000000076df0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0]
|
|---|
| 327 | 15a4.5e8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
|
|---|
| 328 | 15a4.5e8: supR3HardenedDllNotificationCallback: load 000007fefcc60000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0]
|
|---|
| 329 | 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll)
|
|---|
| 330 | 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
|
|---|
| 331 | 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076df0000 'C:\Windows\system32\kernel32.dll'
|
|---|
| 332 | 658.2624: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 796 ms, CloseEvents);
|
|---|