1044.2284: Log file opened: 4.3.28r100309 g_hStartupLog=0000000000000110 g_uNtVerCombined=0x611db110 1044.2284: \SystemRoot\System32\ntdll.dll: 1044.2284: CreationTime: 2015-06-10T18:42:16.781375400Z 1044.2284: LastWriteTime: 2015-05-25T18:21:21.289963400Z 1044.2284: ChangeTime: 2015-06-10T18:48:38.362230200Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x1a61c0 1044.2284: NT Headers: 0xe0 1044.2284: Timestamp: 0x556366f2 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x556366f2 1044.2284: Image Version: 6.1 1044.2284: SizeOfImage: 0x1a9000 (1740800) 1044.2284: Resource Dir: 0x14d000 LB 0x5a028 1044.2284: ProductName: Microsoft® Windows® Operating System 1044.2284: ProductVersion: 6.1.7601.18869 1044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 1044.2284: FileDescription: NT Layer DLL 1044.2284: \SystemRoot\System32\kernel32.dll: 1044.2284: CreationTime: 2015-06-10T18:42:17.138375400Z 1044.2284: LastWriteTime: 2015-05-25T18:19:02.585000000Z 1044.2284: ChangeTime: 2015-06-10T18:48:38.580631600Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x11be00 1044.2284: NT Headers: 0xe8 1044.2284: Timestamp: 0x556366fc 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x556366fc 1044.2284: Image Version: 6.1 1044.2284: SizeOfImage: 0x11f000 (1175552) 1044.2284: Resource Dir: 0x116000 LB 0x528 1044.2284: ProductName: Microsoft® Windows® Operating System 1044.2284: ProductVersion: 6.1.7601.18869 1044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 1044.2284: FileDescription: Windows NT BASE API Client DLL 1044.2284: \SystemRoot\System32\KernelBase.dll: 1044.2284: CreationTime: 2015-06-10T18:42:17.269375400Z 1044.2284: LastWriteTime: 2015-05-25T18:19:02.585000000Z 1044.2284: ChangeTime: 2015-06-10T18:48:38.580631600Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x67c00 1044.2284: NT Headers: 0xe8 1044.2284: Timestamp: 0x556366fd 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x556366fd 1044.2284: Image Version: 6.1 1044.2284: SizeOfImage: 0x6c000 (442368) 1044.2284: Resource Dir: 0x6a000 LB 0x530 1044.2284: ProductName: Microsoft® Windows® Operating System 1044.2284: ProductVersion: 6.1.7601.18869 1044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 1044.2284: FileDescription: Windows NT BASE API Client DLL 1044.2284: \SystemRoot\System32\apisetschema.dll: 1044.2284: CreationTime: 2015-06-10T18:42:15.515375400Z 1044.2284: LastWriteTime: 2015-05-25T18:11:40.254000000Z 1044.2284: ChangeTime: 2015-06-10T18:48:38.346630100Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x1a00 1044.2284: NT Headers: 0xc0 1044.2284: Timestamp: 0x55636622 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x55636622 1044.2284: Image Version: 6.1 1044.2284: SizeOfImage: 0x50000 (327680) 1044.2284: Resource Dir: 0x30000 LB 0x3f8 1044.2284: ProductName: Microsoft® Windows® Operating System 1044.2284: ProductVersion: 6.1.7601.18869 1044.2284: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 1044.2284: FileDescription: ApiSet Schema DLL 1044.2284: NtOpenDirectoryObject failed on \Driver: 0xc0000022 1044.2284: supR3HardenedWinFindAdversaries: 0x3 1044.2284: \SystemRoot\System32\drivers\SysPlant.sys: 1044.2284: CreationTime: 2015-03-02T12:53:04.246699300Z 1044.2284: LastWriteTime: 2015-03-02T12:53:04.246699300Z 1044.2284: ChangeTime: 2015-03-02T12:53:04.246699300Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x26ef0 1044.2284: NT Headers: 0xf8 1044.2284: Timestamp: 0x51a0ec2d 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x51a0ec2d 1044.2284: Image Version: 5.0 1044.2284: SizeOfImage: 0x2f000 (192512) 1044.2284: Resource Dir: 0x2d000 LB 0x490 1044.2284: ProductName: Symantec CMC Firewall 1044.2284: ProductVersion: 12.1.3001.165 1044.2284: FileVersion: 12.1.3001.165 1044.2284: FileDescription: Symantec CMC Firewall SysPlant 1044.2284: \SystemRoot\System32\sysfer.dll: 1044.2284: CreationTime: 2015-03-02T12:53:04.215499200Z 1044.2284: LastWriteTime: 2015-03-02T12:53:04.215499200Z 1044.2284: ChangeTime: 2015-03-02T12:53:04.215499200Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x70190 1044.2284: NT Headers: 0xe8 1044.2284: Timestamp: 0x51a0ecb5 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x51a0ecb5 1044.2284: Image Version: 0.0 1044.2284: SizeOfImage: 0x87000 (552960) 1044.2284: Resource Dir: 0x85000 LB 0x628 1044.2284: ProductName: Symantec CMC Firewall 1044.2284: ProductVersion: 12.1.3001.165 1044.2284: FileVersion: 12.1.3001.165 1044.2284: FileDescription: Symantec CMC Firewall sysfer 1044.2284: \SystemRoot\System32\sysferThunk.dll: 1044.2284: CreationTime: 2015-03-02T12:53:04.231099300Z 1044.2284: LastWriteTime: 2015-03-02T12:53:04.231099300Z 1044.2284: ChangeTime: 2015-03-02T12:53:04.231099300Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x2f90 1044.2284: NT Headers: 0xd0 1044.2284: Timestamp: 0x51a0ecb6 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x51a0ecb6 1044.2284: Image Version: 0.0 1044.2284: SizeOfImage: 0x8000 (32768) 1044.2284: Resource Dir: 0x6000 LB 0x640 1044.2284: ProductName: Symantec CMC Firewall 1044.2284: ProductVersion: 12.1.3001.165 1044.2284: FileVersion: 12.1.3001.165 1044.2284: FileDescription: Symantec CMC Firewall SysferThunk 1044.2284: \SystemRoot\System32\drivers\symevent64x86.sys: 1044.2284: CreationTime: 2015-03-02T12:53:31.921147900Z 1044.2284: LastWriteTime: 2015-03-02T12:53:31.921147900Z 1044.2284: ChangeTime: 2015-03-02T12:53:31.921147900Z 1044.2284: FileAttributes: 0x20 1044.2284: Size: 0x2b4a0 1044.2284: NT Headers: 0xe8 1044.2284: Timestamp: 0x50346f1e 1044.2284: Machine: 0x8664 - amd64 1044.2284: Timestamp: 0x50346f1e 1044.2284: Image Version: 6.0 1044.2284: SizeOfImage: 0x38000 (229376) 1044.2284: Resource Dir: 0x36000 LB 0x3c8 1044.2284: ProductName: SYMEVENT 1044.2284: ProductVersion: 12.9.3.1 1044.2284: FileVersion: 12.9.3.1 1044.2284: FileDescription: Symantec Event Library 1044.2284: Calling main() 1044.2284: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 1044.2284: SUPR3HardenedMain: Respawn #1 1044.2284: System32: \Device\HarddiskVolume1\Windows\System32 1044.2284: WinSxS: \Device\HarddiskVolume1\Windows\winsxs 1044.2284: KnownDllPath: C:\Windows\system32 1044.2284: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1044.2284: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe) 1044.2284: supR3HardNtEnableThreadCreation: 1044.2284: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00000000772fb780 pvNtTerminateThread=000000007731e0e0 1044.2284: supR3HardenedWinDoReSpawn(1): New child 2160.2164 [kernel32]. 1044.2284: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd7000 cbPeb=0x380 1044.2284: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00000000772d0000 uNtDllChildAddr=00000000772d0000 1044.2284: supR3HardenedWinSetupChildInit: uLdrInitThunk=00000000772fb780 1044.2284: supR3HardenedWinSetupChildInit: Start child. 1044.2284: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 1044.2284: supR3HardNtChildPurify: Startup delay kludge #1/0: 513 ms, 64 sleeps 1044.2284: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1044.2284: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000 1044.2284: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000 1044.2284: *0000000000030000-0000000000027fff 0x0040/0x0040 0x0020000 !! 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000030000 (LB 0x8000, 0000000000030000 LB 0x8000) 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000030000/0000000000030000 LB 0/0x8000] 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000030000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 1044.2284: 0000000000038000-000000000002ffff 0x0001/0x0000 0x0000000 1044.2284: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000 1044.2284: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000 1044.2284: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000 1044.2284: 0000000000051000-0000000000041fff 0x0001/0x0000 0x0000000 1044.2284: *0000000000060000-000000000005efff 0x0040/0x0040 0x0020000 !! 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000) 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000] 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x130000 s=0x10000 ap=0x0 rp=0x00000000000001 1044.2284: 0000000000061000-fffffffffff31fff 0x0001/0x0000 0x0000000 1044.2284: *0000000000190000-0000000000093fff 0x0000/0x0004 0x0020000 1044.2284: 000000000028c000-0000000000288fff 0x0104/0x0004 0x0020000 1044.2284: 000000000028f000-000000000028dfff 0x0004/0x0004 0x0020000 1044.2284: 0000000000290000-ffffffff8924ffff 0x0001/0x0000 0x0000000 1044.2284: *00000000772d0000-00000000772d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000772d1000-00000000773cefff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000773cf000-00000000773fdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000773fe000-0000000077405fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077406000-0000000077406fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077407000-0000000077409fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 000000007740a000-0000000077478fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077479000-000000006f911fff 0x0001/0x0000 0x0000000 1044.2284: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000 1044.2284: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000 1044.2284: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000 1044.2284: 000000007fff0000-ffffffffc03effff 0x0001/0x0000 0x0000000 1044.2284: *000000013fbf0000-000000013fbf0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fbf1000-000000013fc75fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fc76000-000000013fc76fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fc77000-000000013fcb4fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcb5000-000000013fcb5fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcb6000-000000013fcb6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcb7000-000000013fcb8fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcb9000-000000013fcb9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcba000-000000013fcbafff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcbb000-000000013fcbefff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcbf000-000000013fcf7fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcf8000-000000013fceffff 0x0001/0x0000 0x0000000 1044.2284: *000000013fd00000-000000013fcfefff 0x0040/0x0040 0x0020000 !! 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fd00000 (LB 0x1000, 000000013fd00000 LB 0x1000) 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fd00000/000000013fd00000 LB 0/0x1000] 1044.2284: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fd00000 LB 0x7fdbf8f0000 s=0x10000 ap=0x0 rp=0x00000000000001 1044.2284: 000000013fd01000-fffff80380411fff 0x0001/0x0000 0x0000000 1044.2284: *000007feff5f0000-000007feff5f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll 1044.2284: 000007feff5f1000-000007fdfec31fff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000 1044.2284: 000007fffffd3000-000007fffffcefff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffd7000-000007fffffd5fff 0x0004/0x0004 0x0020000 1044.2284: 000007fffffd8000-000007fffffd1fff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000 1044.2284: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000 1044.2284: apisetschema.dll: timestamp 0x55636622 (rc=VINF_SUCCESS) 1044.2284: VirtualBox.exe: timestamp 0x555369a5 (rc=VINF_SUCCESS) 1044.2284: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1044.2284: VirtualBox.exe: Differences in section #0 (headers) between file and memory: 1044.2284: 000000013fbf016a / 0x000016a: 00 != 11 1044.2284: 000000013fbf016c / 0x000016c: 00 != cc 1044.2284: 000000013fbf016d / 0x000016d: 00 != 01 1044.2284: 000000013fbf01c0 / 0x00001c0: 00 != cc 1044.2284: 000000013fbf01c1 / 0x00001c1: 00 != 01 1044.2284: 000000013fbf01c2 / 0x00001c2: 00 != 11 1044.2284: 000000013fbf01c4 / 0x00001c4: 00 != 20 1044.2284: Restored 0x400 bytes of original file content at 000000013fbf0000 1044.2284: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports 1044.2284: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports 1044.2284: supR3HardNtChildPurify: cFixes=4 g_fSupAdversaries=0x3 cPatchCount=0 1044.2284: supR3HardNtChildPurify: Startup delay kludge #1/1: 520 ms, 65 sleeps 1044.2284: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1044.2284: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000 1044.2284: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000 1044.2284: 0000000000030000-000000000001ffff 0x0001/0x0000 0x0000000 1044.2284: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000 1044.2284: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000 1044.2284: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000 1044.2284: 0000000000051000-fffffffffff11fff 0x0001/0x0000 0x0000000 1044.2284: *0000000000190000-0000000000093fff 0x0000/0x0004 0x0020000 1044.2284: 000000000028c000-0000000000288fff 0x0104/0x0004 0x0020000 1044.2284: 000000000028f000-000000000028dfff 0x0004/0x0004 0x0020000 1044.2284: 0000000000290000-ffffffff8924ffff 0x0001/0x0000 0x0000000 1044.2284: *00000000772d0000-00000000772d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000772d1000-00000000773cefff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000773cf000-00000000773fdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 00000000773fe000-0000000077405fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077406000-0000000077406fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077407000-0000000077407fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077408000-0000000077409fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 000000007740a000-0000000077478fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 1044.2284: 0000000077479000-000000006f911fff 0x0001/0x0000 0x0000000 1044.2284: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000 1044.2284: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000 1044.2284: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000 1044.2284: 000000007fff0000-ffffffffc03effff 0x0001/0x0000 0x0000000 1044.2284: *000000013fbf0000-000000013fbf0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fbf1000-000000013fc75fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fc76000-000000013fc76fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fc77000-000000013fcb4fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcb5000-000000013fcbefff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcbf000-000000013fcf7fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 1044.2284: 000000013fcf8000-fffff803803fffff 0x0001/0x0000 0x0000000 1044.2284: *000007feff5f0000-000007feff5f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll 1044.2284: 000007feff5f1000-000007fdfec31fff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000 1044.2284: 000007fffffd3000-000007fffffcefff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffd7000-000007fffffd5fff 0x0004/0x0004 0x0020000 1044.2284: 000007fffffd8000-000007fffffd1fff 0x0001/0x0000 0x0000000 1044.2284: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000 1044.2284: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000 1044.2284: supR3HardNtChildPurify: Done after 1070 ms and 4 fixes (loop #1). 1044.2284: supR3HardNtEnableThreadCreation: 2160.2164: Log file opened: 4.3.28r100309 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db110 2160.2164: supR3HardenedVmProcessInit: uNtDllAddr=00000000772d0000 2160.2164: ntdll.dll: timestamp 0x556366f2 (rc=VINF_SUCCESS) 2160.2164: New simple heap: #1 0000000000290000 LB 0x400000 (for 1740800 allocation) 2160.2164: System32: \Device\HarddiskVolume1\Windows\System32 2160.2164: WinSxS: \Device\HarddiskVolume1\Windows\winsxs 2160.2164: KnownDllPath: C:\Windows\system32 2160.2164: supR3HardenedVmProcessInit: Opening vboxdrv stub... 2160.2164: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 2160.2164: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 2160.2164: Registered Dll notification callback with NTDLL. 2160.2164: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll) 2160.2164: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll 2160.2164: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000: [calling] 2160.2164: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 2160.2164: supR3HardenedDllNotificationCallback: load 00000000771b0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0] 2160.2164: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 2160.2164: supR3HardenedDllNotificationCallback: load 000007fefd0b0000 LB 0x0006c000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0] 2160.2164: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll) 2160.2164: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll 2160.2164: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00000000771b0000 'C:\Windows\system32\kernel32.dll' 1044.2284: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 1567 ms, CloseEvents);