VirtualBox

Ticket #20226: VBoxHardening.log

File VBoxHardening.log, 126.1 KB (added by MikeDiack, 4 years ago)

Hardening log file during crash of trying to start a windows guest with VBox 6.1.19 bld 142917

Line 
1109c.1590: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000010 g_uNtVerCombined=0x63258000
2109c.1590: \SystemRoot\System32\ntdll.dll:
3109c.1590: CreationTime: 2020-06-10T07:41:43.891121300Z
4109c.1590: LastWriteTime: 2020-03-31T05:42:15.143120700Z
5109c.1590: ChangeTime: 2021-02-10T09:25:21.845312200Z
6109c.1590: FileAttributes: 0x20
7109c.1590: Size: 0x1a8330
8109c.1590: NT Headers: 0xd8
9109c.1590: Timestamp: 0x5e82c88a
10109c.1590: Machine: 0x8664 - amd64
11109c.1590: Timestamp: 0x5e82c88a
12109c.1590: Image Version: 6.3
13109c.1590: SizeOfImage: 0x1ad000 (1757184)
14109c.1590: Resource Dir: 0x149000 LB 0x62568
15109c.1590: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)]
16109c.1590: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)]
17109c.1590: ProductName: Microsoft® Windows® Operating System
18109c.1590: ProductVersion: 6.3.9600.19678
19109c.1590: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737)
20109c.1590: FileDescription: NT Layer DLL
21109c.1590: \SystemRoot\System32\kernel32.dll:
22109c.1590: CreationTime: 2020-10-14T07:38:35.847512600Z
23109c.1590: LastWriteTime: 2020-09-15T07:06:16.877307400Z
24109c.1590: ChangeTime: 2021-01-13T08:41:59.941134900Z
25109c.1590: FileAttributes: 0x20
26109c.1590: Size: 0x140420
27109c.1590: NT Headers: 0xe8
28109c.1590: Timestamp: 0x5f6047b1
29109c.1590: Machine: 0x8664 - amd64
30109c.1590: Timestamp: 0x5f6047b1
31109c.1590: Image Version: 6.3
32109c.1590: SizeOfImage: 0x13f000 (1306624)
33109c.1590: Resource Dir: 0x12f000 LB 0x530
34109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
35109c.1590: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)]
36109c.1590: ProductName: Microsoft® Windows® Operating System
37109c.1590: ProductVersion: 6.3.9600.19843
38109c.1590: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743)
39109c.1590: FileDescription: Windows NT BASE API Client DLL
40109c.1590: \SystemRoot\System32\KernelBase.dll:
41109c.1590: CreationTime: 2020-06-10T07:41:43.132577500Z
42109c.1590: LastWriteTime: 2020-05-20T15:20:26.061266900Z
43109c.1590: ChangeTime: 2020-10-14T07:40:56.725698500Z
44109c.1590: FileAttributes: 0x20
45109c.1590: Size: 0x115450
46109c.1590: NT Headers: 0xf0
47109c.1590: Timestamp: 0x5ec5262a
48109c.1590: Machine: 0x8664 - amd64
49109c.1590: Timestamp: 0x5ec5262a
50109c.1590: Image Version: 6.3
51109c.1590: SizeOfImage: 0x115000 (1134592)
52109c.1590: Resource Dir: 0x110000 LB 0x3540
53109c.1590: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)]
54109c.1590: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)]
55109c.1590: ProductName: Microsoft® Windows® Operating System
56109c.1590: ProductVersion: 6.3.9600.19724
57109c.1590: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914)
58109c.1590: FileDescription: Windows NT BASE API Client DLL
59109c.1590: \SystemRoot\System32\apisetschema.dll:
60109c.1590: CreationTime: 2018-09-27T07:33:46.913079600Z
61109c.1590: LastWriteTime: 2018-09-27T07:33:46.913079600Z
62109c.1590: ChangeTime: 2018-09-27T07:39:55.522916000Z
63109c.1590: FileAttributes: 0x20
64109c.1590: Size: 0x11158
65109c.1590: NT Headers: 0xd0
66109c.1590: Timestamp: 0x57fa67ee
67109c.1590: Machine: 0x8664 - amd64
68109c.1590: Timestamp: 0x57fa67ee
69109c.1590: Image Version: 6.3
70109c.1590: SizeOfImage: 0x12000 (73728)
71109c.1590: Resource Dir: 0x11000 LB 0x3f8
72109c.1590: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)]
73109c.1590: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)]
74109c.1590: ProductName: Microsoft® Windows® Operating System
75109c.1590: ProductVersion: 6.3.9600.18513
76109c.1590: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600)
77109c.1590: FileDescription: ApiSet Schema DLL
78109c.1590: NtOpenDirectoryObject failed on \Driver: 0xc0000022
79109c.1590: supR3HardenedWinFindAdversaries: 0x3
80109c.1590: \SystemRoot\System32\drivers\SysPlant.sys:
81109c.1590: CreationTime: 2013-11-17T17:14:25.974782000Z
82109c.1590: LastWriteTime: 2018-04-07T00:17:18.253894700Z
83109c.1590: ChangeTime: 2018-04-07T00:17:18.253894700Z
84109c.1590: FileAttributes: 0x20
85109c.1590: Size: 0x30548
86109c.1590: NT Headers: 0xf0
87109c.1590: Timestamp: 0x5a1adc8a
88109c.1590: Machine: 0x8664 - amd64
89109c.1590: Timestamp: 0x5a1adc8a
90109c.1590: Image Version: 5.0
91109c.1590: SizeOfImage: 0x31000 (200704)
92109c.1590: Resource Dir: 0x2f000 LB 0x49c
93109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
94109c.1590: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)]
95109c.1590: ProductName: Symantec CMC Firewall
96109c.1590: ProductVersion: 14.0.3856.1100
97109c.1590: FileVersion: 14.0.3856.1100
98109c.1590: FileDescription: Symantec CMC Firewall SysPlant
99109c.1590: \SystemRoot\System32\sysfer.dll:
100109c.1590: CreationTime: 2013-11-17T17:14:25.969767900Z
101109c.1590: LastWriteTime: 2018-04-07T00:17:18.249652100Z
102109c.1590: ChangeTime: 2018-04-07T00:17:18.249652100Z
103109c.1590: FileAttributes: 0x20
104109c.1590: Size: 0x7cee8
105109c.1590: NT Headers: 0xf8
106109c.1590: Timestamp: 0x5a1adc96
107109c.1590: Machine: 0x8664 - amd64
108109c.1590: Timestamp: 0x5a1adc96
109109c.1590: Image Version: 0.0
110109c.1590: SizeOfImage: 0x95000 (610304)
111109c.1590: Resource Dir: 0x91000 LB 0x490
112109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
113109c.1590: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)]
114109c.1590: ProductName: Symantec CMC Firewall
115109c.1590: ProductVersion: 14.0.3856.1100
116109c.1590: FileVersion: 14.0.3856.1100
117109c.1590: FileDescription: Symantec CMC Firewall sysfer
118109c.1590: \SystemRoot\System32\drivers\symevent64x86.sys:
119109c.1590: CreationTime: 2013-11-17T17:14:52.378966600Z
120109c.1590: LastWriteTime: 2018-04-06T15:17:17.540827600Z
121109c.1590: ChangeTime: 2018-04-06T15:17:17.540827600Z
122109c.1590: FileAttributes: 0x20
123109c.1590: Size: 0x19098
124109c.1590: NT Headers: 0xe0
125109c.1590: Timestamp: 0x59fcb42b
126109c.1590: Machine: 0x8664 - amd64
127109c.1590: Timestamp: 0x59fcb42b
128109c.1590: Image Version: 6.2
129109c.1590: SizeOfImage: 0x23000 (143360)
130109c.1590: Resource Dir: 0x21000 LB 0x3c8
131109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
132109c.1590: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)]
133109c.1590: ProductName: SYMEVENT
134109c.1590: ProductVersion: 14.0.5.9
135109c.1590: FileVersion: 14.0.5.9
136109c.1590: FileDescription: Symantec Event Library
137109c.1590: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
138109c.1590: Calling main()
139109c.1590: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2
140109c.1590: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
141109c.1590: SUPR3HardenedMain: Respawn #1
142109c.1590: System32: \Device\HarddiskVolume4\Windows\System32
143109c.1590: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS
144109c.1590: KnownDllPath: C:\WINDOWS\system32
145109c.1590: supR3HardenedWinInit: Performing a limited self purification...
146109c.1590: supHardNtVpScanVirtualMemory: enmKind=SELF_PURIFICATION
147109c.1590: *0000000000000000-0000000000daffff 0x0001/0x0000 0x0000000
148109c.1590: *0000000000db0000-0000000000dbffff 0x0004/0x0004 0x0040000
149109c.1590: 0000000000dc0000-0000000000dcffff 0x0001/0x0000 0x0000000
150109c.1590: *0000000000dd0000-0000000000ddefff 0x0002/0x0002 0x0040000
151109c.1590: 0000000000ddf000-0000000000ddffff 0x0001/0x0000 0x0000000
152109c.1590: *0000000000de0000-0000000000e90fff 0x0000/0x0004 0x0020000
153109c.1590: 0000000000e91000-0000000000e93fff 0x0104/0x0004 0x0020000
154109c.1590: 0000000000e94000-0000000000edffff 0x0004/0x0004 0x0020000
155109c.1590: *0000000000ee0000-0000000000ee3fff 0x0002/0x0002 0x0040000
156109c.1590: 0000000000ee4000-0000000000eeffff 0x0001/0x0000 0x0000000
157109c.1590: *0000000000ef0000-0000000000ef1fff 0x0004/0x0004 0x0020000
158109c.1590: 0000000000ef2000-0000000000efffff 0x0001/0x0000 0x0000000
159109c.1590: *0000000000f00000-0000000000f01fff 0x0004/0x0004 0x0020000
160109c.1590: 0000000000f02000-0000000000f19fff 0x0000/0x0004 0x0020000
161109c.1590: 0000000000f1a000-0000000000f2ffff 0x0001/0x0000 0x0000000
162109c.1590: *0000000000f30000-0000000000f34fff 0x0004/0x0004 0x0020000
163109c.1590: 0000000000f35000-000000000102ffff 0x0000/0x0004 0x0020000
164109c.1590: *0000000001030000-00000000010adfff 0x0002/0x0002 0x0040000
165109c.1590: 00000000010ae000-000000000118ffff 0x0001/0x0000 0x0000000
166109c.1590: *0000000001190000-000000000119efff 0x0004/0x0004 0x0020000
167109c.1590: 000000000119f000-000000000119ffff 0x0000/0x0004 0x0020000
168109c.1590: *00000000011a0000-00000000011abfff 0x0000/0x0004 0x0020000
169109c.1590: 00000000011ac000-0000000001359fff 0x0004/0x0004 0x0020000
170109c.1590: 000000000135a000-000000000135afff 0x0000/0x0004 0x0020000
171109c.1590: 000000000135b000-000000000135ffff 0x0001/0x0000 0x0000000
172109c.1590: *0000000001360000-000000000137cfff 0x0004/0x0004 0x0020000
173109c.1590: 000000000137d000-000000000145ffff 0x0000/0x0004 0x0020000
174109c.1590: 0000000001460000-000000007ffdffff 0x0001/0x0000 0x0000000
175109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
176109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
177109c.1590: 000000007fff0000-00007ff753e6ffff 0x0001/0x0000 0x0000000
178109c.1590: *00007ff753e70000-00007ff753e74fff 0x0002/0x0002 0x0040000
179109c.1590: 00007ff753e75000-00007ff753f6ffff 0x0000/0x0002 0x0040000
180109c.1590: *00007ff753f70000-00007ff753f92fff 0x0002/0x0002 0x0040000
181109c.1590: 00007ff753f93000-00007ff753f9afff 0x0001/0x0000 0x0000000
182109c.1590: *00007ff753f9b000-00007ff753f9bfff 0x0004/0x0004 0x0020000
183109c.1590: 00007ff753f9c000-00007ff753f9dfff 0x0001/0x0000 0x0000000
184109c.1590: *00007ff753f9e000-00007ff753f9ffff 0x0004/0x0004 0x0020000
185109c.1590: 00007ff753fa0000-00007ff754f4ffff 0x0001/0x0000 0x0000000
186109c.1590: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
187109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
188109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
189109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
190109c.1590: 00007ff755012000-00007ff755014fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
191109c.1590: 00007ff755015000-00007ff755017fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
192109c.1590: 00007ff755018000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
193109c.1590: 00007ff75501b000-00007ff75501bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
194109c.1590: 00007ff75501c000-00007ff75501dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
195109c.1590: 00007ff75501e000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
196109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
197109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000
198109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000
199109c.1590: 00007ff755071000-00007ffdb0e3ffff 0x0001/0x0000 0x0000000
200109c.1590: *00007ffdb0e40000-00007ffdb0e40fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
201109c.1590: 00007ffdb0e41000-00007ffdb0f32fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
202109c.1590: 00007ffdb0f33000-00007ffdb0f35fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
203109c.1590: 00007ffdb0f36000-00007ffdb0f36fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
204109c.1590: 00007ffdb0f37000-00007ffdb0f54fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
205109c.1590: 00007ffdb0f55000-00007ffdb10fffff 0x0001/0x0000 0x0000000
206109c.1590: *00007ffdb1100000-00007ffdb1100fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll
207109c.1590: 00007ffdb1101000-00007ffdb1218fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll
208109c.1590: 00007ffdb1219000-00007ffdb1219fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll
209109c.1590: 00007ffdb121a000-00007ffdb121afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll
210109c.1590: 00007ffdb121b000-00007ffdb123efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll
211109c.1590: 00007ffdb123f000-00007ffdb392ffff 0x0001/0x0000 0x0000000
212109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
213109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
214109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
215109c.1590: 00007ffdb3a64000-00007ffdb3a74fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
216109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
217109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
218109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000
219109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000
220109c.1590: kernel32.dll: timestamp 0x5f6047b1 (rc=VINF_SUCCESS)
221109c.1590: kernelbase.dll: timestamp 0x5ec5262a (rc=VINF_SUCCESS)
222109c.1590: VirtualBoxVM.exe: timestamp 0x60353c8e (rc=VINF_SUCCESS)
223109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
224109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e2.
225109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e2/now.
226109c.1590: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
227109c.1590: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory:
228109c.1590: 00007ff754f5016a / 0x000016a: 00 != 12
229109c.1590: 00007ff754f5016c / 0x000016c: 00 != 14
230109c.1590: Restored 0x400 bytes of original file content at 00007ff754f50000
231109c.1590: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports
232109c.1590: supR3HardenedWinInit: SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED -> VINF_SUCCESS, cFixes=1
233109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
234109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e2.
235109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e2/now.
236109c.1590: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
237109c.1590: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe)
238109c.1590: supR3HardNtEnableThreadCreationEx:
239109c.1590: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30
240109c.1590: supR3HardenedWinDoReSpawn(1): New child 1544.142c [kernel32].
241109c.1590: supR3HardNtChildGatherData: PebBaseAddress=00007ff7546ef000 cbPeb=0x388
242109c.1590: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ffdb3930000 uNtDllChildAddr=00007ffdb3930000
243109c.1590: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ffdb3948db0
244109c.1590: supR3HardenedWinSetupChildInit: Initial context:
245 rax=0000000000000000 rbx=0000000000000000 rcx=00007ff754f57900 rdx=00007ff7546ef000
246 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000
247 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
248 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000
249 rip=00007ffdb39454c0 rsp=000000000064f988 rbp=0000000000000000 ctxflags=0010001b
250 cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80
251 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000
252 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000
253 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000
254 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000
255109c.1590: supR3HardenedWinSetupChildInit: Start child.
256109c.1590: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
257109c.1590: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 47 sleeps
258109c.1590: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
259109c.1590: *0000000000000000-000000000051ffff 0x0001/0x0000 0x0000000
260109c.1590: *0000000000520000-000000000053ffff 0x0004/0x0004 0x0020000
261109c.1590: *0000000000540000-000000000054efff 0x0002/0x0002 0x0040000
262109c.1590: 000000000054f000-000000000054ffff 0x0001/0x0000 0x0000000
263109c.1590: *0000000000550000-000000000064afff 0x0000/0x0004 0x0020000
264109c.1590: 000000000064b000-000000000064dfff 0x0104/0x0004 0x0020000
265109c.1590: 000000000064e000-000000000064ffff 0x0004/0x0004 0x0020000
266109c.1590: *0000000000650000-0000000000653fff 0x0002/0x0002 0x0040000
267109c.1590: 0000000000654000-000000000065ffff 0x0001/0x0000 0x0000000
268109c.1590: *0000000000660000-0000000000661fff 0x0004/0x0004 0x0020000
269109c.1590: 0000000000662000-000000007ffdffff 0x0001/0x0000 0x0000000
270109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
271109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
272109c.1590: 000000007fff0000-00007ff7546bffff 0x0001/0x0000 0x0000000
273109c.1590: *00007ff7546c0000-00007ff7546e2fff 0x0002/0x0002 0x0040000
274109c.1590: 00007ff7546e3000-00007ff7546ecfff 0x0001/0x0000 0x0000000
275109c.1590: *00007ff7546ed000-00007ff7546eefff 0x0004/0x0004 0x0020000
276109c.1590: *00007ff7546ef000-00007ff7546effff 0x0004/0x0004 0x0020000
277109c.1590: 00007ff7546f0000-00007ff754f4ffff 0x0001/0x0000 0x0000000
278109c.1590: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
279109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
280109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
281109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
282109c.1590: 00007ff755012000-00007ff755012fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
283109c.1590: 00007ff755013000-00007ff755013fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
284109c.1590: 00007ff755014000-00007ff755018fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
285109c.1590: 00007ff755019000-00007ff755019fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
286109c.1590: 00007ff75501a000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
287109c.1590: 00007ff75501b000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
288109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
289109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000
290109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000
291109c.1590: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000
292109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
293109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
294109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
295109c.1590: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
296109c.1590: 00007ffdb3a71000-00007ffdb3a71fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
297109c.1590: 00007ffdb3a72000-00007ffdb3a74fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
298109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
299109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
300109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000
301109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000
302109c.1590: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory:
303109c.1590: 00007ff754f5016a / 0x000016a: 00 != 12
304109c.1590: 00007ff754f5016c / 0x000016c: 00 != 14
305109c.1590: Restored 0x400 bytes of original file content at 00007ff754f50000
306109c.1590: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x3
307109c.1590: supR3HardNtChildPurify: Startup delay kludge #1/1: 523 ms, 42 sleeps
308109c.1590: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
309109c.1590: *0000000000000000-000000000051ffff 0x0001/0x0000 0x0000000
310109c.1590: *0000000000520000-000000000053ffff 0x0004/0x0004 0x0020000
311109c.1590: *0000000000540000-000000000054efff 0x0002/0x0002 0x0040000
312109c.1590: 000000000054f000-000000000054ffff 0x0001/0x0000 0x0000000
313109c.1590: *0000000000550000-000000000064afff 0x0000/0x0004 0x0020000
314109c.1590: 000000000064b000-000000000064dfff 0x0104/0x0004 0x0020000
315109c.1590: 000000000064e000-000000000064ffff 0x0004/0x0004 0x0020000
316109c.1590: *0000000000650000-0000000000653fff 0x0002/0x0002 0x0040000
317109c.1590: 0000000000654000-000000000065ffff 0x0001/0x0000 0x0000000
318109c.1590: *0000000000660000-0000000000661fff 0x0004/0x0004 0x0020000
319109c.1590: 0000000000662000-000000007ffdffff 0x0001/0x0000 0x0000000
320109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
321109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
322109c.1590: 000000007fff0000-00007ff7546bffff 0x0001/0x0000 0x0000000
323109c.1590: *00007ff7546c0000-00007ff7546e2fff 0x0002/0x0002 0x0040000
324109c.1590: 00007ff7546e3000-00007ff7546ecfff 0x0001/0x0000 0x0000000
325109c.1590: *00007ff7546ed000-00007ff7546eefff 0x0004/0x0004 0x0020000
326109c.1590: *00007ff7546ef000-00007ff7546effff 0x0004/0x0004 0x0020000
327109c.1590: 00007ff7546f0000-00007ff754f4ffff 0x0001/0x0000 0x0000000
328109c.1590: *00007ff754f50000-00007ff754f50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
329109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
330109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
331109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
332109c.1590: 00007ff755012000-00007ff75501efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
333109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
334109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000
335109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000
336109c.1590: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000
337109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
338109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
339109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
340109c.1590: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
341109c.1590: 00007ffdb3a71000-00007ffdb3a74fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
342109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
343109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
344109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000
345109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000
346109c.1590: supR3HardNtChildPurify: Done after 1042 ms and 1 fixes (loop #1).
3471544.142c: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x63258000
3481544.142c: supR3HardenedVmProcessInit: uNtDllAddr=00007ffdb3930000 g_uNtVerCombined=0x63258000 (stack ~000000000064f438)
3491544.142c: ntdll.dll: timestamp 0x5e82c88a (rc=VINF_SUCCESS)
3501544.142c: New simple heap: #1 0000000000770000 LB 0x400000 (for 1757184 allocation)
351109c.1590: supR3HardNtEnableThreadCreationEx:
3521544.142c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
3531544.142c: System32: \Device\HarddiskVolume4\Windows\System32
3541544.142c: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS
3551544.142c: KnownDllPath: C:\WINDOWS\system32
3561544.142c: supR3HardenedVmProcessInit: Opening vboxdrv stub...
3571544.142c: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
3581544.142c: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
3591544.142c: Registered Dll notification callback with NTDLL.
3601544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\kernel32.dll)
3611544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\kernel32.dll
3621544.142c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000801:<flags> [calling]
3631544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
3641544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb0e40000 LB 0x00115000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0]
3651544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\KernelBase.dll)
3661544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
3671544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1100000 LB 0x0013f000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0]
3681544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
3691544.142c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\KERNEL32.DLL'
3701544.142c: supR3HardenedDllNotificationCallback: load 00007ff754f50000 LB 0x00118000 c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe [fFlags=0x0]
3711544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
3721544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3.
3731544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now.
3741544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
3751544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe)
3761544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
3771544.142c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30
378109c.1590: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 78 ms.
3791544.142c: \SystemRoot\System32\ntdll.dll:
3801544.142c: CreationTime: 2020-06-10T07:41:43.891121300Z
3811544.142c: LastWriteTime: 2020-03-31T05:42:15.143120700Z
3821544.142c: ChangeTime: 2021-02-10T09:25:21.845312200Z
3831544.142c: FileAttributes: 0x20
3841544.142c: Size: 0x1a8330
3851544.142c: NT Headers: 0xd8
3861544.142c: Timestamp: 0x5e82c88a
3871544.142c: Machine: 0x8664 - amd64
3881544.142c: Timestamp: 0x5e82c88a
3891544.142c: Image Version: 6.3
3901544.142c: SizeOfImage: 0x1ad000 (1757184)
3911544.142c: Resource Dir: 0x149000 LB 0x62568
3921544.142c: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)]
3931544.142c: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)]
3941544.142c: ProductName: Microsoft® Windows® Operating System
3951544.142c: ProductVersion: 6.3.9600.19678
3961544.142c: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737)
3971544.142c: FileDescription: NT Layer DLL
3981544.142c: \SystemRoot\System32\kernel32.dll:
3991544.142c: CreationTime: 2020-10-14T07:38:35.847512600Z
4001544.142c: LastWriteTime: 2020-09-15T07:06:16.877307400Z
4011544.142c: ChangeTime: 2021-01-13T08:41:59.941134900Z
4021544.142c: FileAttributes: 0x20
4031544.142c: Size: 0x140420
4041544.142c: NT Headers: 0xe8
4051544.142c: Timestamp: 0x5f6047b1
4061544.142c: Machine: 0x8664 - amd64
4071544.142c: Timestamp: 0x5f6047b1
4081544.142c: Image Version: 6.3
4091544.142c: SizeOfImage: 0x13f000 (1306624)
4101544.142c: Resource Dir: 0x12f000 LB 0x530
4111544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
4121544.142c: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)]
4131544.142c: ProductName: Microsoft® Windows® Operating System
4141544.142c: ProductVersion: 6.3.9600.19843
4151544.142c: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743)
4161544.142c: FileDescription: Windows NT BASE API Client DLL
4171544.142c: \SystemRoot\System32\KernelBase.dll:
4181544.142c: CreationTime: 2020-06-10T07:41:43.132577500Z
4191544.142c: LastWriteTime: 2020-05-20T15:20:26.061266900Z
4201544.142c: ChangeTime: 2020-10-14T07:40:56.725698500Z
4211544.142c: FileAttributes: 0x20
4221544.142c: Size: 0x115450
4231544.142c: NT Headers: 0xf0
4241544.142c: Timestamp: 0x5ec5262a
4251544.142c: Machine: 0x8664 - amd64
4261544.142c: Timestamp: 0x5ec5262a
4271544.142c: Image Version: 6.3
4281544.142c: SizeOfImage: 0x115000 (1134592)
4291544.142c: Resource Dir: 0x110000 LB 0x3540
4301544.142c: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)]
4311544.142c: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)]
4321544.142c: ProductName: Microsoft® Windows® Operating System
4331544.142c: ProductVersion: 6.3.9600.19724
4341544.142c: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914)
4351544.142c: FileDescription: Windows NT BASE API Client DLL
4361544.142c: \SystemRoot\System32\apisetschema.dll:
4371544.142c: CreationTime: 2018-09-27T07:33:46.913079600Z
4381544.142c: LastWriteTime: 2018-09-27T07:33:46.913079600Z
4391544.142c: ChangeTime: 2018-09-27T07:39:55.522916000Z
4401544.142c: FileAttributes: 0x20
4411544.142c: Size: 0x11158
4421544.142c: NT Headers: 0xd0
4431544.142c: Timestamp: 0x57fa67ee
4441544.142c: Machine: 0x8664 - amd64
4451544.142c: Timestamp: 0x57fa67ee
4461544.142c: Image Version: 6.3
4471544.142c: SizeOfImage: 0x12000 (73728)
4481544.142c: Resource Dir: 0x11000 LB 0x3f8
4491544.142c: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)]
4501544.142c: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)]
4511544.142c: ProductName: Microsoft® Windows® Operating System
4521544.142c: ProductVersion: 6.3.9600.18513
4531544.142c: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600)
4541544.142c: FileDescription: ApiSet Schema DLL
4551544.142c: NtOpenDirectoryObject failed on \Driver: 0xc0000022
4561544.142c: supR3HardenedWinFindAdversaries: 0x3
4571544.142c: \SystemRoot\System32\drivers\SysPlant.sys:
4581544.142c: CreationTime: 2013-11-17T17:14:25.974782000Z
4591544.142c: LastWriteTime: 2018-04-07T00:17:18.253894700Z
4601544.142c: ChangeTime: 2018-04-07T00:17:18.253894700Z
4611544.142c: FileAttributes: 0x20
4621544.142c: Size: 0x30548
4631544.142c: NT Headers: 0xf0
4641544.142c: Timestamp: 0x5a1adc8a
4651544.142c: Machine: 0x8664 - amd64
4661544.142c: Timestamp: 0x5a1adc8a
4671544.142c: Image Version: 5.0
4681544.142c: SizeOfImage: 0x31000 (200704)
4691544.142c: Resource Dir: 0x2f000 LB 0x49c
4701544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
4711544.142c: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)]
4721544.142c: ProductName: Symantec CMC Firewall
4731544.142c: ProductVersion: 14.0.3856.1100
4741544.142c: FileVersion: 14.0.3856.1100
4751544.142c: FileDescription: Symantec CMC Firewall SysPlant
4761544.142c: \SystemRoot\System32\sysfer.dll:
4771544.142c: CreationTime: 2013-11-17T17:14:25.969767900Z
4781544.142c: LastWriteTime: 2018-04-07T00:17:18.249652100Z
4791544.142c: ChangeTime: 2018-04-07T00:17:18.249652100Z
4801544.142c: FileAttributes: 0x20
4811544.142c: Size: 0x7cee8
4821544.142c: NT Headers: 0xf8
4831544.142c: Timestamp: 0x5a1adc96
4841544.142c: Machine: 0x8664 - amd64
4851544.142c: Timestamp: 0x5a1adc96
4861544.142c: Image Version: 0.0
4871544.142c: SizeOfImage: 0x95000 (610304)
4881544.142c: Resource Dir: 0x91000 LB 0x490
4891544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
4901544.142c: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)]
4911544.142c: ProductName: Symantec CMC Firewall
4921544.142c: ProductVersion: 14.0.3856.1100
4931544.142c: FileVersion: 14.0.3856.1100
4941544.142c: FileDescription: Symantec CMC Firewall sysfer
4951544.142c: \SystemRoot\System32\drivers\symevent64x86.sys:
4961544.142c: CreationTime: 2013-11-17T17:14:52.378966600Z
4971544.142c: LastWriteTime: 2018-04-06T15:17:17.540827600Z
4981544.142c: ChangeTime: 2018-04-06T15:17:17.540827600Z
4991544.142c: FileAttributes: 0x20
5001544.142c: Size: 0x19098
5011544.142c: NT Headers: 0xe0
5021544.142c: Timestamp: 0x59fcb42b
5031544.142c: Machine: 0x8664 - amd64
5041544.142c: Timestamp: 0x59fcb42b
5051544.142c: Image Version: 6.2
5061544.142c: SizeOfImage: 0x23000 (143360)
5071544.142c: Resource Dir: 0x21000 LB 0x3c8
5081544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
5091544.142c: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)]
5101544.142c: ProductName: SYMEVENT
5111544.142c: ProductVersion: 14.0.5.9
5121544.142c: FileVersion: 14.0.5.9
5131544.142c: FileDescription: Symantec Event Library
5141544.142c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
5151544.142c: Calling main()
5161544.142c: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2
5171544.142c: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
5181544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
5191544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3.
5201544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now.
5211544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
5221544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe)
5231544.142c: SUPR3HardenedMain: Respawn #2
5241544.142c: supR3HardNtEnableThreadCreationEx:
5251544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
5261544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #5 'sechost.dll'.
5271544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #18 'rpcrt4.dll'.
5281544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\advapi32.dll)
5291544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\advapi32.dll
5301544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
5311544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
5321544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #22 'sspicli.dll'.
5331544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll)
5341544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll
5351544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sechost.dll'...
5361544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'sechost.dll' -> '\Device\HarddiskVolume4\Windows\System32\sechost.dll' [rcNtRedir=0xc0150008]
5371544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #2 'rpcrt4.dll'.
5381544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sechost.dll)
5391544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sechost.dll
5401544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
5411544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
5421544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msvcrt.dll)
5431544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msvcrt.dll
5441544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
5451544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
5461544.142c: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
5471544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sspicli.dll'...
5481544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'sspicli.dll' -> '\Device\HarddiskVolume4\Windows\System32\sspicli.dll' [rcNtRedir=0xc0150008]
5491544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'rpcrt4.dll'.
5501544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sspicli.dll)
5511544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sspicli.dll
5521544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
5531544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
5541544.142c: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
5551544.142c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\ADVAPI32.DLL (Input=ADVAPI32.DLL, rcNtResolve=0xc0150008) *pfFlags=0x1000 pwszSearchPath=0000000000000000:<flags> [calling]
5561544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust]
5571544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust]
5581544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1d60000 LB 0x000aa000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0]
5591544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
5601544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb0e10000 LB 0x0002e000 C:\WINDOWS\system32\SspiCli.dll [fFlags=0x0]
5611544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sspicli.dll [lacks WinVerifyTrust]
5621544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1530000 LB 0x0013f000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0]
5631544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
5641544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1990000 LB 0x00058000 C:\WINDOWS\SYSTEM32\sechost.dll [fFlags=0x0]
5651544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust]
5661544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb22f0000 LB 0x000aa000 C:\WINDOWS\system32\ADVAPI32.DLL [fFlags=0x0]
5671544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust]
5681544.142c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb22f0000 'C:\WINDOWS\system32\ADVAPI32.DLL'
5691544.142c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30
5701544.142c: supR3HardenedWinDoReSpawn(2): New child 140c.1420 [kernel32].
5711544.142c: supR3HardNtChildGatherData: PebBaseAddress=00007ff754d5b000 cbPeb=0x388
5721544.142c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ffdb3930000 uNtDllChildAddr=00007ffdb3930000
5731544.142c: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ffdb3948db0
5741544.142c: supR3HardenedWinSetupChildInit: Initial context:
575 rax=0000000000000000 rbx=0000000000000000 rcx=00007ff754f57900 rdx=00007ff754d5b000
576 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000
577 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
578 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000
579 rip=00007ffdb39454c0 rsp=00000000003ffe68 rbp=0000000000000000 ctxflags=0010001b
580 cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80
581 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000
582 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000
583 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000
584 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000
5851544.142c: kernel32.dll: timestamp 0x5f6047b1 (rc=VINF_SUCCESS)
5861544.142c: supR3HardenedWinSetupChildInit: Start child.
5871544.142c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
5881544.142c: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps
5891544.142c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
5901544.142c: *0000000000000000-00000000002cffff 0x0001/0x0000 0x0000000
5911544.142c: *00000000002d0000-00000000002effff 0x0004/0x0004 0x0020000
5921544.142c: *00000000002f0000-00000000002fefff 0x0002/0x0002 0x0040000
5931544.142c: 00000000002ff000-00000000002fffff 0x0001/0x0000 0x0000000
5941544.142c: *0000000000300000-00000000003fafff 0x0000/0x0004 0x0020000
5951544.142c: 00000000003fb000-00000000003fdfff 0x0104/0x0004 0x0020000
5961544.142c: 00000000003fe000-00000000003fffff 0x0004/0x0004 0x0020000
5971544.142c: *0000000000400000-0000000000403fff 0x0002/0x0002 0x0040000
5981544.142c: 0000000000404000-000000000040ffff 0x0001/0x0000 0x0000000
5991544.142c: *0000000000410000-0000000000411fff 0x0004/0x0004 0x0020000
6001544.142c: 0000000000412000-000000007ffdffff 0x0001/0x0000 0x0000000
6011544.142c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
6021544.142c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
6031544.142c: 000000007fff0000-00007ff754d2ffff 0x0001/0x0000 0x0000000
6041544.142c: *00007ff754d30000-00007ff754d52fff 0x0002/0x0002 0x0040000
6051544.142c: 00007ff754d53000-00007ff754d5afff 0x0001/0x0000 0x0000000
6061544.142c: *00007ff754d5b000-00007ff754d5bfff 0x0004/0x0004 0x0020000
6071544.142c: 00007ff754d5c000-00007ff754d5dfff 0x0001/0x0000 0x0000000
6081544.142c: *00007ff754d5e000-00007ff754d5ffff 0x0004/0x0004 0x0020000
6091544.142c: 00007ff754d60000-00007ff754f4ffff 0x0001/0x0000 0x0000000
6101544.142c: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6111544.142c: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6121544.142c: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6131544.142c: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6141544.142c: 00007ff755012000-00007ff755012fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6151544.142c: 00007ff755013000-00007ff755013fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6161544.142c: 00007ff755014000-00007ff755018fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6171544.142c: 00007ff755019000-00007ff755019fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6181544.142c: 00007ff75501a000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6191544.142c: 00007ff75501b000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6201544.142c: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6211544.142c: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000
6221544.142c: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000
6231544.142c: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000
6241544.142c: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6251544.142c: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6261544.142c: 00007ffdb3a5e000-00007ffdb3a63fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6271544.142c: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6281544.142c: 00007ffdb3a71000-00007ffdb3a71fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6291544.142c: 00007ffdb3a72000-00007ffdb3a74fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6301544.142c: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6311544.142c: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6321544.142c: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000
6331544.142c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000
6341544.142c: VirtualBoxVM.exe: timestamp 0x60353c8e (rc=VINF_SUCCESS)
6351544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
6361544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3.
6371544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now.
6381544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
6391544.142c: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory:
6401544.142c: 00007ff754f5016a / 0x000016a: 00 != 12
6411544.142c: 00007ff754f5016c / 0x000016c: 00 != 14
6421544.142c: Restored 0x400 bytes of original file content at 00007ff754f50000
6431544.142c: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports
6441544.142c: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x3
6451544.142c: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps
6461544.142c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
6471544.142c: *0000000000000000-00000000002cffff 0x0001/0x0000 0x0000000
6481544.142c: *00000000002d0000-00000000002effff 0x0004/0x0004 0x0020000
6491544.142c: *00000000002f0000-00000000002fefff 0x0002/0x0002 0x0040000
6501544.142c: 00000000002ff000-00000000002fffff 0x0001/0x0000 0x0000000
6511544.142c: *0000000000300000-00000000003fafff 0x0000/0x0004 0x0020000
6521544.142c: 00000000003fb000-00000000003fdfff 0x0104/0x0004 0x0020000
6531544.142c: 00000000003fe000-00000000003fffff 0x0004/0x0004 0x0020000
6541544.142c: *0000000000400000-0000000000403fff 0x0002/0x0002 0x0040000
6551544.142c: 0000000000404000-000000000040ffff 0x0001/0x0000 0x0000000
6561544.142c: *0000000000410000-0000000000411fff 0x0004/0x0004 0x0020000
6571544.142c: 0000000000412000-000000007ffdffff 0x0001/0x0000 0x0000000
6581544.142c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000
6591544.142c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000
6601544.142c: 000000007fff0000-00007ff754d2ffff 0x0001/0x0000 0x0000000
6611544.142c: *00007ff754d30000-00007ff754d52fff 0x0002/0x0002 0x0040000
6621544.142c: 00007ff754d53000-00007ff754d5afff 0x0001/0x0000 0x0000000
6631544.142c: *00007ff754d5b000-00007ff754d5bfff 0x0004/0x0004 0x0020000
6641544.142c: 00007ff754d5c000-00007ff754d5dfff 0x0001/0x0000 0x0000000
6651544.142c: *00007ff754d5e000-00007ff754d5ffff 0x0004/0x0004 0x0020000
6661544.142c: 00007ff754d60000-00007ff754f4ffff 0x0001/0x0000 0x0000000
6671544.142c: *00007ff754f50000-00007ff754f50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6681544.142c: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6691544.142c: 00007ff754fc8000-00007ff754fc8fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6701544.142c: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6711544.142c: 00007ff755012000-00007ff75501efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6721544.142c: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
6731544.142c: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000
6741544.142c: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000
6751544.142c: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000
6761544.142c: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6771544.142c: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6781544.142c: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6791544.142c: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6801544.142c: 00007ffdb3a71000-00007ffdb3a74fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6811544.142c: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6821544.142c: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll
6831544.142c: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000
6841544.142c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000
6851544.142c: supR3HardNtChildPurify: Done after 1062 ms and 1 fixes (loop #1).
686140c.1420: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x63258000
687140c.1420: supR3HardenedVmProcessInit: uNtDllAddr=00007ffdb3930000 g_uNtVerCombined=0x63258000 (stack ~00000000003ff918)
688140c.1420: ntdll.dll: timestamp 0x5e82c88a (rc=VINF_SUCCESS)
689140c.1420: New simple heap: #1 0000000000520000 LB 0x400000 (for 1757184 allocation)
6901544.142c: supR3HardenedEarlyCompact: Removed heap 1 (0x00000000770000 LB 0x400000)
6911544.142c: supR3HardNtEnableThreadCreationEx:
692140c.1420: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
693140c.1420: System32: \Device\HarddiskVolume4\Windows\System32
694140c.1420: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS
695140c.1420: KnownDllPath: C:\WINDOWS\system32
696140c.1420: supR3HardenedVmProcessInit: Opening vboxdrv...
697140c.1420: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
698140c.1420: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
699140c.1420: Registered Dll notification callback with NTDLL.
700140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\kernel32.dll)
701140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\kernel32.dll
702140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000801:<flags> [calling]
703140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
704140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0e40000 LB 0x00115000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0]
705140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\KernelBase.dll)
706140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\KernelBase.dll
707140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1100000 LB 0x0013f000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0]
708140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
709140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\KERNEL32.DLL'
710140c.1420: supR3HardenedDllNotificationCallback: load 00007ff754f50000 LB 0x00118000 c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe [fFlags=0x0]
711140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
712140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4.
713140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now.
714140c.1420: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
715140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe)
716140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe
717140c.1420: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30
7181544.142c: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 78 ms.
719140c.1420: \SystemRoot\System32\ntdll.dll:
720140c.1420: CreationTime: 2020-06-10T07:41:43.891121300Z
721140c.1420: LastWriteTime: 2020-03-31T05:42:15.143120700Z
722140c.1420: ChangeTime: 2021-02-10T09:25:21.845312200Z
723140c.1420: FileAttributes: 0x20
724140c.1420: Size: 0x1a8330
725140c.1420: NT Headers: 0xd8
726140c.1420: Timestamp: 0x5e82c88a
727140c.1420: Machine: 0x8664 - amd64
728140c.1420: Timestamp: 0x5e82c88a
729140c.1420: Image Version: 6.3
730140c.1420: SizeOfImage: 0x1ad000 (1757184)
731140c.1420: Resource Dir: 0x149000 LB 0x62568
732140c.1420: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)]
733140c.1420: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)]
734140c.1420: ProductName: Microsoft® Windows® Operating System
735140c.1420: ProductVersion: 6.3.9600.19678
736140c.1420: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737)
737140c.1420: FileDescription: NT Layer DLL
738140c.1420: \SystemRoot\System32\kernel32.dll:
739140c.1420: CreationTime: 2020-10-14T07:38:35.847512600Z
740140c.1420: LastWriteTime: 2020-09-15T07:06:16.877307400Z
741140c.1420: ChangeTime: 2021-01-13T08:41:59.941134900Z
742140c.1420: FileAttributes: 0x20
743140c.1420: Size: 0x140420
744140c.1420: NT Headers: 0xe8
745140c.1420: Timestamp: 0x5f6047b1
746140c.1420: Machine: 0x8664 - amd64
747140c.1420: Timestamp: 0x5f6047b1
748140c.1420: Image Version: 6.3
749140c.1420: SizeOfImage: 0x13f000 (1306624)
750140c.1420: Resource Dir: 0x12f000 LB 0x530
751140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
752140c.1420: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)]
753140c.1420: ProductName: Microsoft® Windows® Operating System
754140c.1420: ProductVersion: 6.3.9600.19843
755140c.1420: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743)
756140c.1420: FileDescription: Windows NT BASE API Client DLL
757140c.1420: \SystemRoot\System32\KernelBase.dll:
758140c.1420: CreationTime: 2020-06-10T07:41:43.132577500Z
759140c.1420: LastWriteTime: 2020-05-20T15:20:26.061266900Z
760140c.1420: ChangeTime: 2020-10-14T07:40:56.725698500Z
761140c.1420: FileAttributes: 0x20
762140c.1420: Size: 0x115450
763140c.1420: NT Headers: 0xf0
764140c.1420: Timestamp: 0x5ec5262a
765140c.1420: Machine: 0x8664 - amd64
766140c.1420: Timestamp: 0x5ec5262a
767140c.1420: Image Version: 6.3
768140c.1420: SizeOfImage: 0x115000 (1134592)
769140c.1420: Resource Dir: 0x110000 LB 0x3540
770140c.1420: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)]
771140c.1420: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)]
772140c.1420: ProductName: Microsoft® Windows® Operating System
773140c.1420: ProductVersion: 6.3.9600.19724
774140c.1420: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914)
775140c.1420: FileDescription: Windows NT BASE API Client DLL
776140c.1420: \SystemRoot\System32\apisetschema.dll:
777140c.1420: CreationTime: 2018-09-27T07:33:46.913079600Z
778140c.1420: LastWriteTime: 2018-09-27T07:33:46.913079600Z
779140c.1420: ChangeTime: 2018-09-27T07:39:55.522916000Z
780140c.1420: FileAttributes: 0x20
781140c.1420: Size: 0x11158
782140c.1420: NT Headers: 0xd0
783140c.1420: Timestamp: 0x57fa67ee
784140c.1420: Machine: 0x8664 - amd64
785140c.1420: Timestamp: 0x57fa67ee
786140c.1420: Image Version: 6.3
787140c.1420: SizeOfImage: 0x12000 (73728)
788140c.1420: Resource Dir: 0x11000 LB 0x3f8
789140c.1420: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)]
790140c.1420: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)]
791140c.1420: ProductName: Microsoft® Windows® Operating System
792140c.1420: ProductVersion: 6.3.9600.18513
793140c.1420: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600)
794140c.1420: FileDescription: ApiSet Schema DLL
795140c.1420: NtOpenDirectoryObject failed on \Driver: 0xc0000022
796140c.1420: supR3HardenedWinFindAdversaries: 0x3
797140c.1420: \SystemRoot\System32\drivers\SysPlant.sys:
798140c.1420: CreationTime: 2013-11-17T17:14:25.974782000Z
799140c.1420: LastWriteTime: 2018-04-07T00:17:18.253894700Z
800140c.1420: ChangeTime: 2018-04-07T00:17:18.253894700Z
801140c.1420: FileAttributes: 0x20
802140c.1420: Size: 0x30548
803140c.1420: NT Headers: 0xf0
804140c.1420: Timestamp: 0x5a1adc8a
805140c.1420: Machine: 0x8664 - amd64
806140c.1420: Timestamp: 0x5a1adc8a
807140c.1420: Image Version: 5.0
808140c.1420: SizeOfImage: 0x31000 (200704)
809140c.1420: Resource Dir: 0x2f000 LB 0x49c
810140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
811140c.1420: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)]
812140c.1420: ProductName: Symantec CMC Firewall
813140c.1420: ProductVersion: 14.0.3856.1100
814140c.1420: FileVersion: 14.0.3856.1100
815140c.1420: FileDescription: Symantec CMC Firewall SysPlant
816140c.1420: \SystemRoot\System32\sysfer.dll:
817140c.1420: CreationTime: 2013-11-17T17:14:25.969767900Z
818140c.1420: LastWriteTime: 2018-04-07T00:17:18.249652100Z
819140c.1420: ChangeTime: 2018-04-07T00:17:18.249652100Z
820140c.1420: FileAttributes: 0x20
821140c.1420: Size: 0x7cee8
822140c.1420: NT Headers: 0xf8
823140c.1420: Timestamp: 0x5a1adc96
824140c.1420: Machine: 0x8664 - amd64
825140c.1420: Timestamp: 0x5a1adc96
826140c.1420: Image Version: 0.0
827140c.1420: SizeOfImage: 0x95000 (610304)
828140c.1420: Resource Dir: 0x91000 LB 0x490
829140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
830140c.1420: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)]
831140c.1420: ProductName: Symantec CMC Firewall
832140c.1420: ProductVersion: 14.0.3856.1100
833140c.1420: FileVersion: 14.0.3856.1100
834140c.1420: FileDescription: Symantec CMC Firewall sysfer
835140c.1420: \SystemRoot\System32\drivers\symevent64x86.sys:
836140c.1420: CreationTime: 2013-11-17T17:14:52.378966600Z
837140c.1420: LastWriteTime: 2018-04-06T15:17:17.540827600Z
838140c.1420: ChangeTime: 2018-04-06T15:17:17.540827600Z
839140c.1420: FileAttributes: 0x20
840140c.1420: Size: 0x19098
841140c.1420: NT Headers: 0xe0
842140c.1420: Timestamp: 0x59fcb42b
843140c.1420: Machine: 0x8664 - amd64
844140c.1420: Timestamp: 0x59fcb42b
845140c.1420: Image Version: 6.2
846140c.1420: SizeOfImage: 0x23000 (143360)
847140c.1420: Resource Dir: 0x21000 LB 0x3c8
848140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)]
849140c.1420: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)]
850140c.1420: ProductName: SYMEVENT
851140c.1420: ProductVersion: 14.0.5.9
852140c.1420: FileVersion: 14.0.5.9
853140c.1420: FileDescription: Symantec Event Library
854140c.1420: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
855140c.1420: Calling main()
856140c.1420: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2
857140c.1420: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox'
858140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202
859140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4.
860140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now.
861140c.1420: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports
862140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe)
863140c.1420: SUPR3HardenedMain: Final process, opening VBoxDrv...
864140c.1420: supR3HardenedEarlyCompact: Removed heap 1 (0x00000000520000 LB 0x400000)
865140c.1420: supR3HardNtEnableThreadCreationEx:
866140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #1/2: info status: 24202
867140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4.
868140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now.
869140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll)
870140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll
871140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801:<flags> [calling]
872140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
873140c.1420: supR3HardenedDllNotificationCallback: load 00007ffd9b140000 LB 0x00005000 c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL [fFlags=0x0]
874140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
875140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
876140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
877140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
878140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
879140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
880140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
881140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
882140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
883140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'crypt32.dll'.
884140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #19 'msasn1.dll'.
885140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #29 'rpcrt4.dll'.
886140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\wintrust.dll)
887140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\wintrust.dll
888140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
889140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
890140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #22 'sspicli.dll'.
891140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll)
892140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll
893140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'...
894140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008]
895140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msasn1.dll)
896140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msasn1.dll
897140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'...
898140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume4\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008]
899140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
900140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #28 'msasn1.dll'.
901140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\crypt32.dll)
902140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\crypt32.dll
903140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
904140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
905140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msvcrt.dll)
906140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msvcrt.dll
907140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'...
908140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008]
909140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msasn1.dll [lacks WinVerifyTrust]
910140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
911140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
912140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
913140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sspicli.dll'...
914140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'sspicli.dll' -> '\Device\HarddiskVolume4\Windows\System32\sspicli.dll' [rcNtRedir=0xc0150008]
915140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'rpcrt4.dll'.
916140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sspicli.dll)
917140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sspicli.dll
918140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
919140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
920140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
921140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\Wintrust.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801:<flags> [calling]
922140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
923140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #2 'rpcrt4.dll'.
924140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sechost.dll)
925140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sechost.dll
926140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1d60000 LB 0x000aa000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0]
927140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
928140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b00000 LB 0x00011000 C:\WINDOWS\system32\MSASN1.dll [fFlags=0x0]
929140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msasn1.dll [lacks WinVerifyTrust]
930140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b80000 LB 0x001de000 C:\WINDOWS\system32\CRYPT32.dll [fFlags=0x0]
931140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
932140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1990000 LB 0x00058000 C:\WINDOWS\SYSTEM32\sechost.dll [fFlags=0x0]
933140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust]
934140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0e10000 LB 0x0002e000 C:\WINDOWS\system32\SspiCli.dll [fFlags=0x0]
935140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sspicli.dll [lacks WinVerifyTrust]
936140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1530000 LB 0x0013f000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0]
937140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
938140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b20000 LB 0x00051000 C:\WINDOWS\system32\Wintrust.dll [fFlags=0x0]
939140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
940140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\WINDOWS\system32\Wintrust.dll'
941140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\bcrypt.dll)
942140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\bcrypt.dll
943140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
944140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
945140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
946140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcrypt.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801:<flags> [calling]
947140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
948140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0590000 LB 0x00026000 C:\WINDOWS\system32\bcrypt.dll [fFlags=0x0]
949140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
950140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0590000 'C:\WINDOWS\system32\bcrypt.dll'
951140c.1420: bcrypt.dll loaded at 00007ffdb0590000, BCryptOpenAlgorithmProvider at 00007ffdb0593490, preloading providers:
952140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll)
953140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll
954140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcryptprimitives.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
955140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
956140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb08b0000 LB 0x00063000 C:\WINDOWS\system32\bcryptprimitives.dll [fFlags=0x0]
957140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
958140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb08b0000 'C:\WINDOWS\system32\bcryptprimitives.dll'
959140c.1420: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=0000000000a6a520)
960140c.1420: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=0000000000a6b090)
961140c.1420: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=0000000000a6b1c0)
962140c.1420: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=0000000000a6b420)
963140c.1420: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=0000000000a6b550)
964140c.1420: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=0000000000a6b680)
965140c.1420: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=0000000000a6b8d0)
966140c.1420: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=0000000000a6ba00)
967140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\cryptsp.dll)
968140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptsp.dll
969140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0380000 LB 0x00020000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll [fFlags=0x0]
970140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\cryptsp.dll [lacks WinVerifyTrust]
971140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcrypt.dll'.
972140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rsaenh.dll)
973140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rsaenh.dll
974140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'...
975140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008]
976140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
977140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
978140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
979140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0250000 LB 0x00036000 C:\WINDOWS\system32\rsaenh.dll [fFlags=0x0]
980140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
981140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
982140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcryptprimitives.dll'.
983140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\cryptbase.dll)
984140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptbase.dll
985140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0920000 LB 0x0000b000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll [fFlags=0x0]
986140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\cryptbase.dll [lacks WinVerifyTrust]
987140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
988140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcryptprimitives.dll'...
989140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcryptprimitives.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll' [rcNtRedir=0xc0150008]
990140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
991140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
992140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\kernel32.dll'
993140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
994140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\WINTRUST.DLL (Input=WINTRUST.DLL, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
995140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\WINDOWS\system32\WINTRUST.DLL'
996140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
997140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\CRYPT32.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
998140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\CRYPT32.dll'
999140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
1000140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1001140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\Windows\System32\WINTRUST.DLL'
1002140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1cd0000 LB 0x00016000 C:\WINDOWS\system32\imagehlp.dll [fFlags=0x0]
1003140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
1004140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\imagehlp.dll)
1005140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\imagehlp.dll
1006140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1007140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
1008140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
1009140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
1010140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1011140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1012140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #7 'bcrypt.dll'.
1013140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #8 'ntasn1.dll'.
1014140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\ncrypt.dll)
1015140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\ncrypt.dll
1016140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\ntasn1.dll)
1017140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\ntasn1.dll
1018140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0520000 LB 0x00037000 C:\WINDOWS\SYSTEM32\NTASN1.dll [fFlags=0x0]
1019140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ntasn1.dll [lacks WinVerifyTrust]
1020140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0560000 LB 0x00025000 C:\WINDOWS\SYSTEM32\ncrypt.dll [fFlags=0x0]
1021140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ncrypt.dll [lacks WinVerifyTrust]
1022140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
1023140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #10 'rpcrt4.dll'.
1024140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\gpapi.dll)
1025140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\gpapi.dll
1026140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdafc10000 LB 0x00024000 C:\WINDOWS\SYSTEM32\gpapi.dll [fFlags=0x0]
1027140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\gpapi.dll [lacks WinVerifyTrust]
1028140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\profapi.dll)
1029140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\profapi.dll
1030140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0a50000 LB 0x00015000 C:\WINDOWS\SYSTEM32\profapi.dll [fFlags=0x0]
1031140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\profapi.dll [lacks WinVerifyTrust]
1032140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
1033140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'crypt32.dll'.
1034140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #10 'wldap32.dll'.
1035140c.1420: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume4\Windows\System32\cryptnet.dll)
1036140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptnet.dll
1037140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'wldap32.dll'...
1038140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'wldap32.dll' -> '\Device\HarddiskVolume4\Windows\System32\wldap32.dll' [rcNtRedir=0xc0150008]
1039140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
1040140c.1420: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume4\Windows\System32\Wldap32.dll)
1041140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\Wldap32.dll
1042140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'...
1043140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume4\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008]
1044140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
1045140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
1046140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
1047140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
1048140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
1049140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
1050140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
1051140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
1052140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
1053140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
1054140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'ntasn1.dll'...
1055140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'ntasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\ntasn1.dll' [rcNtRedir=0xc0150008]
1056140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ntasn1.dll [lacks WinVerifyTrust]
1057140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'...
1058140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008]
1059140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
1060140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
1061140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
1062140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
1063140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (Input=cryptnet.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1064140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1065140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1240000 LB 0x0005c000 C:\WINDOWS\system32\WLDAP32.dll [fFlags=0x0]
1066140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\Wldap32.dll [lacks WinVerifyTrust]
1067140c.1420: supR3HardenedDllNotificationCallback: load 00007ffd89480000 LB 0x00033000 C:\WINDOWS\system32\cryptnet.dll [fFlags=0x0]
1068140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1069140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1070140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1071140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1072140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1073140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1074140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1075140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1076140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1077140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1078140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1079140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1080140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1081140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1082140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1083140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1084140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1085140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001:<flags> [calling]
1086140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1087140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1088140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1089140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1090140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1091140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1092140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1093140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1094140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1095140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1096140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1097140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll'
1098140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust]
1099140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\Windows\System32\cryptnet.dll'
1100140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
1101140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #5 'sechost.dll'.
1102140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #18 'rpcrt4.dll'.
1103140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\advapi32.dll)
1104140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\advapi32.dll
1105140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb22f0000 LB 0x000aa000 C:\WINDOWS\SYSTEM32\advapi32.dll [fFlags=0x0]
1106140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust]
1107140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1108140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
1109140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
1110140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
1111140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sechost.dll'...
1112140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'sechost.dll' -> '\Device\HarddiskVolume4\Windows\System32\sechost.dll' [rcNtRedir=0xc0150008]
1113140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust]
1114140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
1115140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
1116140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
1117140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1118140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1119140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
1120140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1121140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1122140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000000 pwszName=\SystemRoot\System32\ntdll.dll
1123140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: New context 0000000000b10cb0
1124140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0
1125140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=5C1D3464CD79E6AC99FD3875E99A7BB19EA62EA5
1126140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
1127140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rpcrt4.dll (Input=rpcrt4.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1128140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1530000 'C:\WINDOWS\system32\rpcrt4.dll'
1129140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1130140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1131140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1132140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
1133140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1134140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1135140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_145_for_KB4565540~31bf3856ad364e35~amd64~~6.3.1.14.cat'; file='\SystemRoot\System32\ntdll.dll'
1136140c.1420: g_pfnWinVerifyTrust=00007ffdb0b21050
1137140c.1420: supR3HardenedScreenImage/preload: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [redoing WinVerifyTrust]
1138140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1139140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1140140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1141140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
1142140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1143140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1144140c.1420: supR3HardenedScreenImage/preload: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\crypt32.dll'
1145140c.1420: supR3HardenedScreenImage/preload: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [redoing WinVerifyTrust]
1146140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1147140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1148140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1149140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll
1150140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1151140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1152140c.1420: supR3HardenedScreenImage/preload: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\wintrust.dll'
1153140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1154140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1155140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1156140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1157140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\advapi32.dll'
1158140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000370 pwszName=\Device\HarddiskVolume4\Windows\System32\Wldap32.dll
1159140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 0000000000b10cb0
1160140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0
1161140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=C703EA5C53886AFFF727297D74E706540A242423
1162140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1163140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1164140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1165140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1666_for_KB4592484~31bf3856ad364e35~amd64~~6.3.1.9.cat'; file='\Device\HarddiskVolume4\Windows\System32\Wldap32.dll'
1166140c.1420: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900)
1167140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 22900) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\Wldap32.dll'
1168140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=000000000000036c pwszName=\Device\HarddiskVolume4\Windows\System32\cryptnet.dll
1169140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 0000000000b10cb0
1170140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0
1171140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=7F501A7B907459FED689C7B6483581A8D309E60F
1172140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1173140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1174140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1175140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1666_for_KB4592484~31bf3856ad364e35~amd64~~6.3.1.9.cat'; file='\Device\HarddiskVolume4\Windows\System32\cryptnet.dll'
1176140c.1420: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900)
1177140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 22900) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptnet.dll'
1178140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1179140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1180140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1181140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\profapi.dll'
1182140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1183140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1184140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1185140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\gpapi.dll'
1186140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1187140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1188140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1189140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\ntasn1.dll'
1190140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1191140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1192140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1193140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\ncrypt.dll'
1194140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1195140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1196140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll
1197140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1198140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1199140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\imagehlp.dll'
1200140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1201140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001:<flags> [calling]
1202140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1203140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1204140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptbase.dll'
1205140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
1206140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1207140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1208140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\rsaenh.dll'
1209140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1210140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1211140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptsp.dll'
1212140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1213140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1214140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll'
1215140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1216140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1217140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll'
1218140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1219140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1220140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\sechost.dll'
1221140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1222140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1223140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\sspicli.dll'
1224140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1225140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1226140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll'
1227140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1228140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1229140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\msasn1.dll'
1230140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1231140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1232140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll'
1233140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1234140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll'
1235140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1236140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe'
1237140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1238140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1239140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\KernelBase.dll'
1240140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1241140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1242140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\kernel32.dll'
1243140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll'
1244140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root
1245140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x5ad46780fa5df300 DC=com, DC=microsoft, CN=Microsoft Root Certificate Authority
1246140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xea5386456178582b C=ZA, ST=Western Cape, L=Durbanville, O=Thawte, OU=Thawte Certification, CN=Thawte Timestamping CA
1247140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x62e562aabc48cf00 C=DE, Email=info@win-unattended.de, CN=Win-Unattended
1248140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3be670c1bd02a900 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority
1249140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011
1250140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x646e3fe3ba08df00 C=US, O=MSFT, CN=Microsoft Authenticode(tm) Root Authority
1251140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x47e5a682fd46a2ab CN=10.1.30.106
1252140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA
1253140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xece4e4289e08b900 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010
1254140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc2a1c04d38e7b800 CN=DSA Root CA
1255140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x43a9cc371ff5385a O=Microsoft Trust Network, OU=Microsoft Corporation, OU=Microsoft Time Stamping Service Root, OU=Copyright (c) 1997 Microsoft Corp.
1256140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x2e2d2c7c68f0202e O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign Time Stamping Service Root, OU=NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.
1257140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa12b07674f1bf600 C=US, O=AffirmTrust, CN=AffirmTrust Commercial
1258140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x2ca429a5c4c6a700 C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA
1259140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd8dbfb2c27bfb200 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2008 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA - G3
1260140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x61a3a33f81aace00 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Object
1261140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x6b7bdc34cd37bb00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2
1262140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x57ba5395b561bf00 C=BM, O=QuoVadis Limited, OU=Root Certification Authority, CN=QuoVadis Root Certification Authority
1263140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf4fd306318ccda00 C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
1264140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x83085097e9afdf00 O=Digital Signature Trust Co., CN=DST Root CA X3
1265140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x780679907625cc00 OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign
1266140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root
1267140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa0ee62086758b15d C=US, O=Equifax, OU=Equifax Secure Certificate Authority
1268140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xeae16ef49d40be00 C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
1269140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd944bca189a00 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2
1270140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x8ff6fc03c1edbd00 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
1271140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc6fa4243b695b600 C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority
1272140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa3ce8d99e60eda00 C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
1273140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x560ad29254e89100 C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
1274140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa671e9fec832b700 C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority
1275140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa8de7211e13be200 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA
1276140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7ae89c50f0b6a00f C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root
1277140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd45980fbf0a0ac00 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA
1278140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc9edb72b684ba00 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2
1279140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf5cd95e581a4ab00 C=US, O=SecureTrust Corporation, CN=SecureTrust CA
1280140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xabd0695c5d11d15e C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
1281140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x6f2ebe0e24cfa600 OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign
1282140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x14018a1bf29e595c C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
1283140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x35f812d09650dc00 C=FR, O=Certplus, CN=Class 2 Primary CA
1284140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x9e5bc2d78b6a3636 C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA, Email=premium-server@thawte.com
1285140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7c4fd32ec1b1ce00 C=PL, O=Unizeto Sp. z o.o., CN=Certum CA
1286140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA
1287140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x16e64d2a56ccf200 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., OU=http://certificates.starfieldtech.com/repository/, CN=Starfield Services Root Certificate Authority
1288140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xb28612a94b4dad00 O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048)
1289140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x357a29080824af00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5
1290140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x59faf1086271bf00 C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
1291140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x466cbc09db88c100 C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
1292140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3401b15e3761c700 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2008 VeriSign, Inc. - For authorized use only, CN=VeriSign Universal Root Certification Authority
1293140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7cd4ff7b15b8be00 C=US, O=GeoTrust Inc., CN=GeoTrust Primary Certification Authority
1294140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc30e361765128000 C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
1295140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x491857ead79dde00 C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority
1296140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xab549401526569d3 L=Internet, O=VeriSign, Inc., OU=VeriSign Commercial Software Publishers CA
1297140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xb9ff821d139e9bf OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign
1298140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xdc1801b225aea100 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3
1299140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc2ba72a37dfbe300 C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
1300140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x8043e4ce150ead00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA
1301140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf2e6331af7b700 C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
1302140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7018ac27aad6b100 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM Group, OU=Admin, CN=WPM Group User Root CA, Email=hostmaster@cryohost.net
1303140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x5cb87a8c9d279100 CN=WPM Group Root CA
1304140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xe2153043b1a9c00 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM, OU=Admin, CN=WPM Group Root CA, Email=hostmaster@wpminternet.com
1305140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xfbb0faaefac5a900 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM Group, OU=Admin, CN=WPM Group Web Filter CA, Email=hostmaster@cryohost.net
1306140c.1420: supR3HardenedWinRetrieveTrustedRootCAs: cAdded=62
1307140c.1420: SUPR3HardenedMain: Load Runtime...
1308140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #1/2: info status: 24202
1309140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #2/2: Unknown Status -5659 (0xffffe9e5) w/ timestamp=0x60353c8e/link.
1310140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1311140c.1420: supHardenedWinVerifyImageByHandle: -> -5659 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll) WinVerifyTrust
1312140c.1420: Error (rc=0):
1313140c.1420: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -5659 (0xffffe9e5) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #2/2: Not valid kernel code signature.: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll
1314140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll
1315140c.1420: Error (rc=0):
1316140c.1420: supR3HardenedMonitor_LdrLoadDll: rejecting 'c:\Program Files\Oracle\VirtualBox\VBoxRT.dll' (c:\Program Files\Oracle\VirtualBox\VBoxRT.dll): rcNt=0xc0000190
1317140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0xc0000190 'c:\Program Files\Oracle\VirtualBox\VBoxRT.dll'
1318140c.1420: Error -610 in supR3HardenedMainInitRuntime! (enmWhat=4)
1319140c.1420: LoadLibrary "c:\Program Files\Oracle\VirtualBox/VBoxRT.dll" failed (rc=1790)
1320140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #1/2: info status: 24202
1321140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #2/2: Unknown Status -5659 (0xffffe9e5) w/ timestamp=0x60353ca4/link.
1322140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll'
1323140c.1420: supHardenedWinVerifyImageByHandle: -> -5659 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll) WinVerifyTrust
1324140c.1420: Error (rc=0):
1325140c.1420: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -5659 (0xffffe9e5) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #2/2: Not valid kernel code signature.: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll
1326140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll
1327140c.1420: Error (rc=0):
1328140c.1420: supR3HardenedMonitor_LdrLoadDll: rejecting 'c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll' (c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll): rcNt=0xc0000190
1329140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0xc0000190 'c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll'
13301544.142c: supR3HardNtChildWaitFor[2]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 844 ms, the end);
1331109c.1590: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 2062 ms, the end);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy