VirtualBox

Ticket #14353: VBoxStartup.log

File VBoxStartup.log, 20.7 KB (added by shaunxu, 9 years ago)
Line 
1222c.1704: Log file opened: 5.0.0r101573 g_hStartupLog=0000000000000058 g_uNtVerCombined=0x611db110
2222c.1704: \SystemRoot\System32\ntdll.dll:
3222c.1704: CreationTime: 2015-06-15T00:44:20.364375900Z
4222c.1704: LastWriteTime: 2015-05-25T18:21:21.289963400Z
5222c.1704: ChangeTime: 2015-06-15T02:56:18.955596700Z
6222c.1704: FileAttributes: 0x20
7222c.1704: Size: 0x1a61c0
8222c.1704: NT Headers: 0xe0
9222c.1704: Timestamp: 0x556366f2
10222c.1704: Machine: 0x8664 - amd64
11222c.1704: Timestamp: 0x556366f2
12222c.1704: Image Version: 6.1
13222c.1704: SizeOfImage: 0x1a9000 (1740800)
14222c.1704: Resource Dir: 0x14d000 LB 0x5a028
15222c.1704: ProductName: Microsoft® Windows® Operating System
16222c.1704: ProductVersion: 6.1.7601.18869
17222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
18222c.1704: FileDescription: NT Layer DLL
19222c.1704: \SystemRoot\System32\kernel32.dll:
20222c.1704: CreationTime: 2015-06-15T00:44:21.543170600Z
21222c.1704: LastWriteTime: 2015-05-25T18:19:02.585000000Z
22222c.1704: ChangeTime: 2015-06-15T02:56:19.813602200Z
23222c.1704: FileAttributes: 0x20
24222c.1704: Size: 0x11be00
25222c.1704: NT Headers: 0xe8
26222c.1704: Timestamp: 0x556366fc
27222c.1704: Machine: 0x8664 - amd64
28222c.1704: Timestamp: 0x556366fc
29222c.1704: Image Version: 6.1
30222c.1704: SizeOfImage: 0x11f000 (1175552)
31222c.1704: Resource Dir: 0x116000 LB 0x528
32222c.1704: ProductName: Microsoft® Windows® Operating System
33222c.1704: ProductVersion: 6.1.7601.18869
34222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
35222c.1704: FileDescription: Windows NT BASE API Client DLL
36222c.1704: \SystemRoot\System32\KernelBase.dll:
37222c.1704: CreationTime: 2015-06-15T00:44:22.635163600Z
38222c.1704: LastWriteTime: 2015-05-25T18:19:02.585000000Z
39222c.1704: ChangeTime: 2015-06-15T02:56:19.813602200Z
40222c.1704: FileAttributes: 0x20
41222c.1704: Size: 0x67c00
42222c.1704: NT Headers: 0xe8
43222c.1704: Timestamp: 0x556366fd
44222c.1704: Machine: 0x8664 - amd64
45222c.1704: Timestamp: 0x556366fd
46222c.1704: Image Version: 6.1
47222c.1704: SizeOfImage: 0x6c000 (442368)
48222c.1704: Resource Dir: 0x6a000 LB 0x530
49222c.1704: ProductName: Microsoft® Windows® Operating System
50222c.1704: ProductVersion: 6.1.7601.18869
51222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
52222c.1704: FileDescription: Windows NT BASE API Client DLL
53222c.1704: \SystemRoot\System32\apisetschema.dll:
54222c.1704: CreationTime: 2015-06-15T00:44:16.695694100Z
55222c.1704: LastWriteTime: 2015-05-25T18:11:40.254000000Z
56222c.1704: ChangeTime: 2015-06-15T02:56:18.924396500Z
57222c.1704: FileAttributes: 0x20
58222c.1704: Size: 0x1a00
59222c.1704: NT Headers: 0xc0
60222c.1704: Timestamp: 0x55636622
61222c.1704: Machine: 0x8664 - amd64
62222c.1704: Timestamp: 0x55636622
63222c.1704: Image Version: 6.1
64222c.1704: SizeOfImage: 0x50000 (327680)
65222c.1704: Resource Dir: 0x30000 LB 0x3f8
66222c.1704: ProductName: Microsoft® Windows® Operating System
67222c.1704: ProductVersion: 6.1.7601.18869
68222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603)
69222c.1704: FileDescription: ApiSet Schema DLL
70222c.1704: Found driver SysPlant (0x1)
71222c.1704: Found driver SymNetS (0x2)
72222c.1704: Found driver SymDS (0x2)
73222c.1704: Found driver SRTSPX (0x2)
74222c.1704: Found driver SymEvent (0x2)
75222c.1704: Found driver SymIRON (0x2)
76222c.1704: supR3HardenedWinFindAdversaries: 0x3
77222c.1704: \SystemRoot\System32\drivers\SysPlant.sys:
78222c.1704: CreationTime: 2013-08-15T07:14:36.223563800Z
79222c.1704: LastWriteTime: 2014-09-18T01:26:52.026822000Z
80222c.1704: ChangeTime: 2014-09-18T01:26:52.026822000Z
81222c.1704: FileAttributes: 0x20
82222c.1704: Size: 0x25f50
83222c.1704: NT Headers: 0x100
84222c.1704: Timestamp: 0x53da082a
85222c.1704: Machine: 0x8664 - amd64
86222c.1704: Timestamp: 0x53da082a
87222c.1704: Image Version: 5.0
88222c.1704: SizeOfImage: 0x2d000 (184320)
89222c.1704: Resource Dir: 0x2b000 LB 0x498
90222c.1704: ProductName: Symantec CMC Firewall
91222c.1704: ProductVersion: 12.1.4112.4156
92222c.1704: FileVersion: 12.1.4112.4156
93222c.1704: FileDescription: Symantec CMC Firewall SysPlant
94222c.1704: \SystemRoot\System32\sysfer.dll:
95222c.1704: CreationTime: 2013-08-15T07:14:36.207963700Z
96222c.1704: LastWriteTime: 2014-09-18T01:26:51.964421900Z
97222c.1704: ChangeTime: 2014-09-18T01:26:51.964421900Z
98222c.1704: FileAttributes: 0x20
99222c.1704: Size: 0x70d70
100222c.1704: NT Headers: 0xe8
101222c.1704: Timestamp: 0x53da08b7
102222c.1704: Machine: 0x8664 - amd64
103222c.1704: Timestamp: 0x53da08b7
104222c.1704: Image Version: 0.0
105222c.1704: SizeOfImage: 0x88000 (557056)
106222c.1704: Resource Dir: 0x86000 LB 0x630
107222c.1704: ProductName: Symantec CMC Firewall
108222c.1704: ProductVersion: 12.1.4112.4156
109222c.1704: FileVersion: 12.1.4112.4156
110222c.1704: FileDescription: Symantec CMC Firewall sysfer
111222c.1704: \SystemRoot\System32\sysferThunk.dll:
112222c.1704: CreationTime: 2013-08-15T07:14:36.207963700Z
113222c.1704: LastWriteTime: 2014-09-18T01:26:51.980021900Z
114222c.1704: ChangeTime: 2014-09-18T01:26:51.980021900Z
115222c.1704: FileAttributes: 0x20
116222c.1704: Size: 0x3170
117222c.1704: NT Headers: 0xd0
118222c.1704: Timestamp: 0x53da08b8
119222c.1704: Machine: 0x8664 - amd64
120222c.1704: Timestamp: 0x53da08b8
121222c.1704: Image Version: 0.0
122222c.1704: SizeOfImage: 0x8000 (32768)
123222c.1704: Resource Dir: 0x6000 LB 0x648
124222c.1704: ProductName: Symantec CMC Firewall
125222c.1704: ProductVersion: 12.1.4112.4156
126222c.1704: FileVersion: 12.1.4112.4156
127222c.1704: FileDescription: Symantec CMC Firewall SysferThunk
128222c.1704: \SystemRoot\System32\drivers\symevent64x86.sys:
129222c.1704: CreationTime: 2013-08-15T07:14:52.322792000Z
130222c.1704: LastWriteTime: 2014-09-17T04:58:16.559956600Z
131222c.1704: ChangeTime: 2014-09-17T04:58:16.559956600Z
132222c.1704: FileAttributes: 0x20
133222c.1704: Size: 0x2b658
134222c.1704: NT Headers: 0xe8
135222c.1704: Timestamp: 0x51f32ff2
136222c.1704: Machine: 0x8664 - amd64
137222c.1704: Timestamp: 0x51f32ff2
138222c.1704: Image Version: 6.0
139222c.1704: SizeOfImage: 0x38000 (229376)
140222c.1704: Resource Dir: 0x36000 LB 0x3c8
141222c.1704: ProductName: SYMEVENT
142222c.1704: ProductVersion: 12.9.5.2
143222c.1704: FileVersion: 12.9.5.2
144222c.1704: FileDescription: Symantec Event Library
145222c.1704: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
146222c.1704: Calling main()
147222c.1704: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
148222c.1704: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
149222c.1704: SUPR3HardenedMain: Respawn #1
150222c.1704: System32: \Device\HarddiskVolume1\Windows\System32
151222c.1704: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
152222c.1704: KnownDllPath: C:\windows\system32
153222c.1704: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
154222c.1704: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
155222c.1704: supR3HardNtEnableThreadCreation:
156222c.1704: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000077cbb780 pvNtTerminateThread=0000000077cde0e0
157222c.1704: supR3HardenedWinDoReSpawn(1): New child 2244.1cb8 [kernel32].
158222c.1704: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd4000 cbPeb=0x380
159222c.1704: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077c90000 uNtDllChildAddr=0000000077c90000
160222c.1704: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000077cbb780
161222c.1704: supR3HardenedWinSetupChildInit: Start child.
162222c.1704: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
163222c.1704: supR3HardNtChildPurify: Startup delay kludge #1/0: 520 ms, 65 sleeps
164222c.1704: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
165222c.1704: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
166222c.1704: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
167222c.1704: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000
168222c.1704: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000
169222c.1704: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000
170222c.1704: 0000000000041000-0000000000031fff 0x0001/0x0000 0x0000000
171222c.1704: *0000000000050000-000000000004efff 0x0040/0x0040 0x0020000 !!
172222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000050000 (LB 0x1000, 0000000000050000 LB 0x1000)
173222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000050000/0000000000050000 LB 0/0x1000]
174222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000050000 LB 0x30000 s=0x10000 ap=0x0 rp=0x00000000000001
175222c.1704: 0000000000051000-0000000000021fff 0x0001/0x0000 0x0000000
176222c.1704: *0000000000080000-fffffffffff83fff 0x0000/0x0004 0x0020000
177222c.1704: 000000000017c000-0000000000178fff 0x0104/0x0004 0x0020000
178222c.1704: 000000000017f000-000000000017dfff 0x0004/0x0004 0x0020000
179222c.1704: 0000000000180000-ffffffff8866ffff 0x0001/0x0000 0x0000000
180222c.1704: *0000000077c90000-0000000077c90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
181222c.1704: 0000000077c91000-0000000077d8efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
182222c.1704: 0000000077d8f000-0000000077dbdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
183222c.1704: 0000000077dbe000-0000000077dc5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
184222c.1704: 0000000077dc6000-0000000077dc6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
185222c.1704: 0000000077dc7000-0000000077dc9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
186222c.1704: 0000000077dca000-0000000077e38fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
187222c.1704: 0000000077e39000-0000000070c91fff 0x0001/0x0000 0x0000000
188222c.1704: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
189222c.1704: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
190222c.1704: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
191222c.1704: 000000007fff0000-ffffffffc031ffff 0x0001/0x0000 0x0000000
192222c.1704: *000000013fcc0000-000000013fcc0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
193222c.1704: 000000013fcc1000-000000013fd46fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
194222c.1704: 000000013fd47000-000000013fd47fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
195222c.1704: 000000013fd48000-000000013fd91fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
196222c.1704: 000000013fd92000-000000013fd92fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
197222c.1704: 000000013fd93000-000000013fd93fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
198222c.1704: 000000013fd94000-000000013fd95fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
199222c.1704: 000000013fd96000-000000013fd96fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
200222c.1704: 000000013fd97000-000000013fd97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
201222c.1704: 000000013fd98000-000000013fd9bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
202222c.1704: 000000013fd9c000-000000013fde5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
203222c.1704: 000000013fde6000-000000013fddbfff 0x0001/0x0000 0x0000000
204222c.1704: *000000013fdf0000-000000013fdeefff 0x0040/0x0040 0x0020000 !!
205222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fdf0000 (LB 0x1000, 000000013fdf0000 LB 0x1000)
206222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fdf0000/000000013fdf0000 LB 0/0x1000]
207222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fdf0000 LB 0x7fdc01c0000 s=0x10000 ap=0x0 rp=0x00000000000001
208222c.1704: 000000013fdf1000-fffff8037fc31fff 0x0001/0x0000 0x0000000
209222c.1704: *000007fefffb0000-000007fefffb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
210222c.1704: 000007fefffb1000-000007fdfffc1fff 0x0001/0x0000 0x0000000
211222c.1704: *000007fffffa0000-000007fffff6cfff 0x0002/0x0002 0x0040000
212222c.1704: 000007fffffd3000-000007fffffd1fff 0x0001/0x0000 0x0000000
213222c.1704: *000007fffffd4000-000007fffffd2fff 0x0004/0x0004 0x0020000
214222c.1704: 000007fffffd5000-000007fffffcbfff 0x0001/0x0000 0x0000000
215222c.1704: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
216222c.1704: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
217222c.1704: apisetschema.dll: timestamp 0x55636622 (rc=VINF_SUCCESS)
218222c.1704: VirtualBox.exe: timestamp 0x559e485f (rc=VINF_SUCCESS)
219222c.1704: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
220222c.1704: VirtualBox.exe: Differences in section #0 (headers) between file and memory:
221222c.1704: 000000013fcc016a / 0x000016a: 00 != 13
222222c.1704: 000000013fcc016c / 0x000016c: 00 != cc
223222c.1704: 000000013fcc016d / 0x000016d: 00 != 01
224222c.1704: 000000013fcc01c0 / 0x00001c0: 00 != cc
225222c.1704: 000000013fcc01c1 / 0x00001c1: 00 != 01
226222c.1704: 000000013fcc01c2 / 0x00001c2: 00 != 13
227222c.1704: 000000013fcc01c4 / 0x00001c4: 00 != 20
228222c.1704: Restored 0x400 bytes of original file content at 000000013fcc0000
229222c.1704: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports
230222c.1704: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
231222c.1704: supR3HardNtChildPurify: cFixes=3 g_fSupAdversaries=0x3 cPatchCount=0
232222c.1704: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 54 sleeps
233222c.1704: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
234222c.1704: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
235222c.1704: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
236222c.1704: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000
237222c.1704: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000
238222c.1704: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000
239222c.1704: 0000000000041000-0000000000001fff 0x0001/0x0000 0x0000000
240222c.1704: *0000000000080000-fffffffffff83fff 0x0000/0x0004 0x0020000
241222c.1704: 000000000017c000-0000000000178fff 0x0104/0x0004 0x0020000
242222c.1704: 000000000017f000-000000000017dfff 0x0004/0x0004 0x0020000
243222c.1704: 0000000000180000-ffffffff8866ffff 0x0001/0x0000 0x0000000
244222c.1704: *0000000077c90000-0000000077c90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
245222c.1704: 0000000077c91000-0000000077d8efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
246222c.1704: 0000000077d8f000-0000000077dbdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
247222c.1704: 0000000077dbe000-0000000077dc5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
248222c.1704: 0000000077dc6000-0000000077dc6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
249222c.1704: 0000000077dc7000-0000000077dc7fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
250222c.1704: 0000000077dc8000-0000000077dc9fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
251222c.1704: 0000000077dca000-0000000077e38fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
252222c.1704: 0000000077e39000-0000000070c91fff 0x0001/0x0000 0x0000000
253222c.1704: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
254222c.1704: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
255222c.1704: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
256222c.1704: 000000007fff0000-ffffffffc031ffff 0x0001/0x0000 0x0000000
257222c.1704: *000000013fcc0000-000000013fcc0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
258222c.1704: 000000013fcc1000-000000013fd46fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
259222c.1704: 000000013fd47000-000000013fd47fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
260222c.1704: 000000013fd48000-000000013fd91fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
261222c.1704: 000000013fd92000-000000013fd9bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
262222c.1704: 000000013fd9c000-000000013fde5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
263222c.1704: 000000013fde6000-fffff8037fc1bfff 0x0001/0x0000 0x0000000
264222c.1704: *000007fefffb0000-000007fefffb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
265222c.1704: 000007fefffb1000-000007fdfffc1fff 0x0001/0x0000 0x0000000
266222c.1704: *000007fffffa0000-000007fffff6cfff 0x0002/0x0002 0x0040000
267222c.1704: 000007fffffd3000-000007fffffd1fff 0x0001/0x0000 0x0000000
268222c.1704: *000007fffffd4000-000007fffffd2fff 0x0004/0x0004 0x0020000
269222c.1704: 000007fffffd5000-000007fffffcbfff 0x0001/0x0000 0x0000000
270222c.1704: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
271222c.1704: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
272222c.1704: supR3HardNtChildPurify: Done after 1236 ms and 3 fixes (loop #1).
273222c.1704: supR3HardNtEnableThreadCreation:
2742244.1cb8: Log file opened: 5.0.0r101573 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db110
2752244.1cb8: supR3HardenedVmProcessInit: uNtDllAddr=0000000077c90000
2762244.1cb8: ntdll.dll: timestamp 0x556366f2 (rc=VINF_SUCCESS)
2772244.1cb8: New simple heap: #1 0000000000280000 LB 0x400000 (for 1740800 allocation)
2782244.1cb8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
2792244.1cb8: System32: \Device\HarddiskVolume1\Windows\System32
2802244.1cb8: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
2812244.1cb8: KnownDllPath: C:\windows\system32
2822244.1cb8: supR3HardenedVmProcessInit: Opening vboxdrv stub...
2832244.1cb8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
2842244.1cb8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
2852244.1cb8: Registered Dll notification callback with NTDLL.
2862244.1cb8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll)
2872244.1cb8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll
2882244.1cb8: supR3HardenedMonitor_LdrLoadDll: pName=C:\windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling]
2892244.1cb8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2902244.1cb8: supR3HardenedDllNotificationCallback: load 0000000077a70000 LB 0x0011f000 C:\windows\system32\kernel32.dll [fFlags=0x0]
2912244.1cb8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2922244.1cb8: supR3HardenedDllNotificationCallback: load 000007fefdad0000 LB 0x0006c000 C:\windows\system32\KERNELBASE.dll [fFlags=0x0]
2932244.1cb8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll)
2942244.1cb8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
2952244.1cb8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000077a70000 'C:\windows\system32\kernel32.dll'
296222c.1704: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 77 ms, CloseEvents);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy