VirtualBox

Ticket #15239: VBoxHardening.log

File VBoxHardening.log, 16.4 KB (added by Jooyoung, Yoon, 9 years ago)

VBoxHardening.log

Line 
13368.3244: Log file opened: 5.0.17r105971 g_hStartupLog=0000000000000198 g_uNtVerCombined=0xa0295a00
23368.3244: \SystemRoot\System32\ntdll.dll:
33368.3244: CreationTime: 2016-03-02T02:25:49.535825900Z
43368.3244: LastWriteTime: 2016-02-23T11:25:45.858135200Z
53368.3244: ChangeTime: 2016-03-02T18:16:49.210265300Z
63368.3244: FileAttributes: 0x20
73368.3244: Size: 0x1bc048
83368.3244: NT Headers: 0xe0
93368.3244: Timestamp: 0x56cbf9dd
103368.3244: Machine: 0x8664 - amd64
113368.3244: Timestamp: 0x56cbf9dd
123368.3244: Image Version: 10.0
133368.3244: SizeOfImage: 0x1c1000 (1839104)
143368.3244: Resource Dir: 0x159000 LB 0x66220
153368.3244: ProductName: Microsoft® Windows® Operating System
163368.3244: ProductVersion: 10.0.10586.122
173368.3244: FileVersion: 10.0.10586.122 (th2_release_inmarket.160222-1549)
183368.3244: FileDescription: NT Layer DLL
193368.3244: \SystemRoot\System32\kernel32.dll:
203368.3244: CreationTime: 2015-10-30T07:17:46.221743200Z
213368.3244: LastWriteTime: 2015-10-30T07:17:46.221743200Z
223368.3244: ChangeTime: 2016-01-04T02:07:57.862185600Z
233368.3244: FileAttributes: 0x20
243368.3244: Size: 0xac430
253368.3244: NT Headers: 0xf0
263368.3244: Timestamp: 0x5632d5aa
273368.3244: Machine: 0x8664 - amd64
283368.3244: Timestamp: 0x5632d5aa
293368.3244: Image Version: 10.0
303368.3244: SizeOfImage: 0xad000 (708608)
313368.3244: Resource Dir: 0xab000 LB 0x528
323368.3244: ProductName: Microsoft® Windows® Operating System
333368.3244: ProductVersion: 10.0.10586.0
343368.3244: FileVersion: 10.0.10586.0 (th2_release.151029-1700)
353368.3244: FileDescription: Windows NT BASE API Client DLL
363368.3244: \SystemRoot\System32\KernelBase.dll:
373368.3244: CreationTime: 2016-02-10T12:14:07.022897200Z
383368.3244: LastWriteTime: 2016-01-27T06:01:28.588179900Z
393368.3244: ChangeTime: 2016-02-11T01:13:21.795297000Z
403368.3244: FileAttributes: 0x20
413368.3244: Size: 0x1e7a10
423368.3244: NT Headers: 0xf0
433368.3244: Timestamp: 0x56a8489c
443368.3244: Machine: 0x8664 - amd64
453368.3244: Timestamp: 0x56a8489c
463368.3244: Image Version: 10.0
473368.3244: SizeOfImage: 0x1e8000 (1998848)
483368.3244: Resource Dir: 0x1d1000 LB 0x540
493368.3244: ProductName: Microsoft® Windows® Operating System
503368.3244: ProductVersion: 10.0.10586.103
513368.3244: FileVersion: 10.0.10586.103 (th2_release.160126-1819)
523368.3244: FileDescription: Windows NT BASE API Client DLL
533368.3244: \SystemRoot\System32\apisetschema.dll:
543368.3244: CreationTime: 2015-10-30T07:17:57.502957900Z
553368.3244: LastWriteTime: 2015-10-30T07:17:57.502957900Z
563368.3244: ChangeTime: 2016-01-04T02:07:56.877759900Z
573368.3244: FileAttributes: 0x20
583368.3244: Size: 0x16d60
593368.3244: NT Headers: 0xc8
603368.3244: Timestamp: 0x5632d94c
613368.3244: Machine: 0x8664 - amd64
623368.3244: Timestamp: 0x5632d94c
633368.3244: Image Version: 10.0
643368.3244: SizeOfImage: 0x18000 (98304)
653368.3244: Resource Dir: 0x17000 LB 0x400
663368.3244: ProductName: Microsoft® Windows® Operating System
673368.3244: ProductVersion: 10.0.10586.0
683368.3244: FileVersion: 10.0.10586.0 (th2_release.151029-1700)
693368.3244: FileDescription: ApiSet Schema DLL
703368.3244: supR3HardenedWinFindAdversaries: 0x0
713368.3244: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
723368.3244: Calling main()
733368.3244: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
743368.3244: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
753368.3244: SUPR3HardenedMain: Respawn #1
763368.3244: System32: \Device\HarddiskVolume1\Windows\System32
773368.3244: WinSxS: \Device\HarddiskVolume1\Windows\WinSxS
783368.3244: KnownDllPath: C:\WINDOWS\system32
793368.3244: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
803368.3244: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
813368.3244: supR3HardNtEnableThreadCreation:
823368.3244: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ff9b8526d50 pvNtTerminateThread=00007ff9b8555b20
833368.3244: supR3HardenedWinDoReSpawn(1): New child 1c18.1144 [kernel32].
843368.3244: supR3HardNtChildGatherData: PebBaseAddress=0000000000323000 cbPeb=0x388
853368.3244: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ff9b84b0000 uNtDllChildAddr=00007ff9b84b0000
863368.3244: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ff9b8526d50
873368.3244: supR3HardenedWinSetupChildInit: Start child.
883368.3244: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
893368.3244: supR3HardNtChildPurify: Startup delay kludge #1/0: 263 ms, 31 sleeps
903368.3244: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
913368.3244: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
923368.3244: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
933368.3244: *0000000000030000-000000000001afff 0x0002/0x0002 0x0040000
943368.3244: 0000000000045000-0000000000039fff 0x0001/0x0000 0x0000000
953368.3244: *0000000000050000-fffffffffff53fff 0x0000/0x0004 0x0020000
963368.3244: 000000000014c000-0000000000148fff 0x0104/0x0004 0x0020000
973368.3244: 000000000014f000-000000000014dfff 0x0004/0x0004 0x0020000
983368.3244: *0000000000150000-000000000014bfff 0x0002/0x0002 0x0040000
993368.3244: 0000000000154000-0000000000147fff 0x0001/0x0000 0x0000000
1003368.3244: *0000000000160000-000000000015dfff 0x0004/0x0004 0x0020000
1013368.3244: 0000000000162000-00000000000c3fff 0x0001/0x0000 0x0000000
1023368.3244: *0000000000200000-00000000000dcfff 0x0000/0x0004 0x0020000
1033368.3244: 0000000000323000-000000000031ffff 0x0004/0x0004 0x0020000
1043368.3244: 0000000000326000-000000000024bfff 0x0000/0x0004 0x0020000
1053368.3244: 0000000000400000-00000000002cffff 0x0001/0x0000 0x0000000
1063368.3244: *0000000000530000-000000000052dfff 0x0040/0x0040 0x0020000 !!
1073368.3244: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000530000 (LB 0x2000, 0000000000530000 LB 0x2000)
1083368.3244: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000530000/0000000000530000 LB 0/0x2000]
1093368.3244: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000530000 LB 0x7fab0000 s=0x10000 ap=0x0 rp=0x00400100000001
1103368.3244: 0000000000532000-ffffffff80a83fff 0x0001/0x0000 0x0000000
1113368.3244: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
1123368.3244: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
1133368.3244: 000000007fff0000-ffff800a8c8fffff 0x0001/0x0000 0x0000000
1143368.3244: *00007ff6736e0000-00007ff6736acfff 0x0002/0x0002 0x0040000
1153368.3244: 00007ff673713000-00007ff672fd5fff 0x0001/0x0000 0x0000000
1163368.3244: *00007ff673e50000-00007ff673e50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1173368.3244: 00007ff673e51000-00007ff673ed7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1183368.3244: 00007ff673ed8000-00007ff673ed8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1193368.3244: 00007ff673ed9000-00007ff673f23fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1203368.3244: 00007ff673f24000-00007ff673f24fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1213368.3244: 00007ff673f25000-00007ff673f25fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1223368.3244: 00007ff673f26000-00007ff673f2afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1233368.3244: 00007ff673f2b000-00007ff673f2bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1243368.3244: 00007ff673f2c000-00007ff673f2cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1253368.3244: 00007ff673f2d000-00007ff673f30fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1263368.3244: 00007ff673f31000-00007ff673f7bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1273368.3244: 00007ff673f7c000-00007ff32fa47fff 0x0001/0x0000 0x0000000
1283368.3244: *00007ff9b84b0000-00007ff9b84b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1293368.3244: 00007ff9b84b1000-00007ff9b85adfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1303368.3244: 00007ff9b85ae000-00007ff9b85eefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1313368.3244: 00007ff9b85ef000-00007ff9b85f7fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1323368.3244: 00007ff9b85f8000-00007ff9b8604fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1333368.3244: 00007ff9b8605000-00007ff9b8605fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1343368.3244: 00007ff9b8606000-00007ff9b8608fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1353368.3244: 00007ff9b8609000-00007ff9b8670fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1363368.3244: 00007ff9b8671000-00007ff370d01fff 0x0001/0x0000 0x0000000
1373368.3244: *00007ffffffe0000-00007ffffffcffff 0x0001/0x0002 0x0020000
1383368.3244: VirtualBox.exe: timestamp 0x56e30231 (rc=VINF_SUCCESS)
1393368.3244: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
1403368.3244: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
1413368.3244: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x80000000
1423368.3244: supR3HardNtChildPurify: Startup delay kludge #1/1: 520 ms, 62 sleeps
1433368.3244: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
1443368.3244: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
1453368.3244: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
1463368.3244: *0000000000030000-000000000001afff 0x0002/0x0002 0x0040000
1473368.3244: 0000000000045000-0000000000039fff 0x0001/0x0000 0x0000000
1483368.3244: *0000000000050000-fffffffffff53fff 0x0000/0x0004 0x0020000
1493368.3244: 000000000014c000-0000000000148fff 0x0104/0x0004 0x0020000
1503368.3244: 000000000014f000-000000000014dfff 0x0004/0x0004 0x0020000
1513368.3244: *0000000000150000-000000000014bfff 0x0002/0x0002 0x0040000
1523368.3244: 0000000000154000-0000000000147fff 0x0001/0x0000 0x0000000
1533368.3244: *0000000000160000-000000000015dfff 0x0004/0x0004 0x0020000
1543368.3244: 0000000000162000-00000000000c3fff 0x0001/0x0000 0x0000000
1553368.3244: *0000000000200000-00000000000dcfff 0x0000/0x0004 0x0020000
1563368.3244: 0000000000323000-000000000031ffff 0x0004/0x0004 0x0020000
1573368.3244: 0000000000326000-000000000024bfff 0x0000/0x0004 0x0020000
1583368.3244: 0000000000400000-ffffffff8081ffff 0x0001/0x0000 0x0000000
1593368.3244: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
1603368.3244: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
1613368.3244: 000000007fff0000-ffff800a8c8fffff 0x0001/0x0000 0x0000000
1623368.3244: *00007ff6736e0000-00007ff6736acfff 0x0002/0x0002 0x0040000
1633368.3244: 00007ff673713000-00007ff672fd5fff 0x0001/0x0000 0x0000000
1643368.3244: *00007ff673e50000-00007ff673e50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1653368.3244: 00007ff673e51000-00007ff673ed7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1663368.3244: 00007ff673ed8000-00007ff673ed8fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1673368.3244: 00007ff673ed9000-00007ff673f23fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1683368.3244: 00007ff673f24000-00007ff673f30fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1693368.3244: 00007ff673f31000-00007ff673f7bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1703368.3244: 00007ff673f7c000-00007ff32fa47fff 0x0001/0x0000 0x0000000
1713368.3244: *00007ff9b84b0000-00007ff9b84b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1723368.3244: 00007ff9b84b1000-00007ff9b85adfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1733368.3244: 00007ff9b85ae000-00007ff9b85eefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1743368.3244: 00007ff9b85ef000-00007ff9b85f2fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1753368.3244: 00007ff9b85f3000-00007ff9b85f7fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1763368.3244: 00007ff9b85f8000-00007ff9b8604fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1773368.3244: 00007ff9b8605000-00007ff9b8605fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1783368.3244: 00007ff9b8606000-00007ff9b8608fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1793368.3244: 00007ff9b8609000-00007ff9b8670fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1803368.3244: 00007ff9b8671000-00007ff370d01fff 0x0001/0x0000 0x0000000
1813368.3244: *00007ffffffe0000-00007ffffffcffff 0x0001/0x0002 0x0020000
1823368.3244: supR3HardNtChildPurify: Done after 1324 ms and 1 fixes (loop #1).
1833368.3244: supR3HardNtEnableThreadCreation:
1841c18.1144: Log file opened: 5.0.17r105971 g_hStartupLog=0000000000000004 g_uNtVerCombined=0xa0295a00
1851c18.1144: supR3HardenedVmProcessInit: uNtDllAddr=00007ff9b84b0000 g_uNtVerCombined=0xa0295a00
1861c18.1144: ntdll.dll: timestamp 0x56cbf9dd (rc=VINF_SUCCESS)
1871c18.1144: New simple heap: #1 0000000000500000 LB 0x400000 (for 1839104 allocation)
1881c18.1144: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
1891c18.1144: System32: \Device\HarddiskVolume1\Windows\System32
1901c18.1144: WinSxS: \Device\HarddiskVolume1\Windows\WinSxS
1911c18.1144: KnownDllPath: C:\WINDOWS\system32
1921c18.1144: supR3HardenedVmProcessInit: Opening vboxdrv stub...
1931c18.1144: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
1941c18.1144: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
1951c18.1144: Registered Dll notification callback with NTDLL.
1961c18.1144: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll)
1971c18.1144: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll
1981c18.1144: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000801:<flags> [calling]
1991c18.1144: supR3HardenedDllNotificationCallback: load 00007ff9b52d0000 LB 0x001e8000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0]
2001c18.1144: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll)
2011c18.1144: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
2021c18.1144: supR3HardenedDllNotificationCallback: load 00007ff9b7980000 LB 0x000ad000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0]
2031c18.1144: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2041c18.1144: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ff9b7980000 'C:\WINDOWS\system32\KERNEL32.DLL'
2051c18.1144: supR3HardenedDllNotificationCallback: load 00007ff673e50000 LB 0x0012c000 C:\Program Files\Oracle\VirtualBox\VirtualBox.exe [fFlags=0x0]
2061c18.1144: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
2071c18.1144: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
2081c18.1144: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
2093368.3244: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 126 ms, CloseEvents);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy