658.2624: Log file opened: 5.1.22r115126 g_hStartupLog=000000000000024c g_uNtVerCombined=0x611db110 658.2624: \SystemRoot\System32\ntdll.dll: 658.2624: CreationTime: 2017-05-15T11:40:24.977655900Z 658.2624: LastWriteTime: 2017-04-28T01:11:49.878278200Z 658.2624: ChangeTime: 2017-05-15T11:48:18.514070200Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x1a7100 658.2624: NT Headers: 0xe0 658.2624: Timestamp: 0x590296ce 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x590296ce 658.2624: Image Version: 6.1 658.2624: SizeOfImage: 0x1aa000 (1744896) 658.2624: Resource Dir: 0x14e000 LB 0x5a028 658.2624: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 658.2624: ProductName: Microsoft® Windows® Operating System 658.2624: ProductVersion: 6.1.7601.23796 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) 658.2624: FileDescription: NT Layer DLL 658.2624: \SystemRoot\System32\kernel32.dll: 658.2624: CreationTime: 2017-05-15T11:40:25.367655900Z 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z 658.2624: ChangeTime: 2017-05-15T11:48:23.818079600Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x11c000 658.2624: NT Headers: 0xe0 658.2624: Timestamp: 0x59029713 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x59029713 658.2624: Image Version: 6.1 658.2624: SizeOfImage: 0x11f000 (1175552) 658.2624: Resource Dir: 0x116000 LB 0x528 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 658.2624: ProductName: Microsoft® Windows® Operating System 658.2624: ProductVersion: 6.1.7601.23796 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) 658.2624: FileDescription: Windows NT BASE API Client DLL 658.2624: \SystemRoot\System32\KernelBase.dll: 658.2624: CreationTime: 2017-05-15T11:40:27.080155900Z 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z 658.2624: ChangeTime: 2017-05-15T11:48:23.849279600Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x66800 658.2624: NT Headers: 0xe8 658.2624: Timestamp: 0x59029714 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x59029714 658.2624: Image Version: 6.1 658.2624: SizeOfImage: 0x6a000 (434176) 658.2624: Resource Dir: 0x68000 LB 0x530 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)] 658.2624: ProductName: Microsoft® Windows® Operating System 658.2624: ProductVersion: 6.1.7601.23796 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) 658.2624: FileDescription: Windows NT BASE API Client DLL 658.2624: \SystemRoot\System32\apisetschema.dll: 658.2624: CreationTime: 2017-05-15T11:40:28.850155900Z 658.2624: LastWriteTime: 2017-04-28T01:09:58.126000000Z 658.2624: ChangeTime: 2017-05-15T11:48:18.233269700Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x1a00 658.2624: NT Headers: 0xc0 658.2624: Timestamp: 0x590296af 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x590296af 658.2624: Image Version: 6.1 658.2624: SizeOfImage: 0x50000 (327680) 658.2624: Resource Dir: 0x30000 LB 0x3f8 658.2624: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)] 658.2624: ProductName: Microsoft® Windows® Operating System 658.2624: ProductVersion: 6.1.7601.23796 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) 658.2624: FileDescription: ApiSet Schema DLL 658.2624: Found driver SysPlant (0x1) 658.2624: Found driver SymNetS (0x2) 658.2624: Found driver SRTSPX (0x2) 658.2624: Found driver SymEvent (0x2) 658.2624: Found driver SymIRON (0x2) 658.2624: supR3HardenedWinFindAdversaries: 0x3 658.2624: \SystemRoot\System32\drivers\SysPlant.sys: 658.2624: CreationTime: 2015-04-08T09:25:06.205658700Z 658.2624: LastWriteTime: 2015-04-08T09:25:06.205658700Z 658.2624: ChangeTime: 2015-04-08T09:25:06.205658700Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x26f40 658.2624: NT Headers: 0x100 658.2624: Timestamp: 0x5413cb4e 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x5413cb4e 658.2624: Image Version: 5.0 658.2624: SizeOfImage: 0x2d000 (184320) 658.2624: Resource Dir: 0x2b000 LB 0x498 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x2b0b8 LB 0x3e0, codepage 0x4e4 (reserved 0x0)] 658.2624: ProductName: Symantec CMC Firewall 658.2624: ProductVersion: 12.1.5337.5000 658.2624: FileVersion: 12.1.5337.5000 658.2624: FileDescription: Symantec CMC Firewall SysPlant 658.2624: \SystemRoot\System32\sysfer.dll: 658.2624: CreationTime: 2015-04-08T09:25:06.200658700Z 658.2624: LastWriteTime: 2015-04-08T09:25:06.200658700Z 658.2624: ChangeTime: 2015-04-08T09:25:06.200658700Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x70f60 658.2624: NT Headers: 0xe8 658.2624: Timestamp: 0x5413cb55 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x5413cb55 658.2624: Image Version: 0.0 658.2624: SizeOfImage: 0x88000 (557056) 658.2624: Resource Dir: 0x86000 LB 0x630 658.2624: [Version info resource found at 0xc8! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x86100 LB 0x3d4, codepage 0x4e4 (reserved 0x0)] 658.2624: ProductName: Symantec CMC Firewall 658.2624: ProductVersion: 12.1.5337.5000 658.2624: FileVersion: 12.1.5337.5000 658.2624: FileDescription: Symantec CMC Firewall sysfer 658.2624: \SystemRoot\System32\drivers\symevent64x86.sys: 658.2624: CreationTime: 2015-04-08T09:25:49.025658700Z 658.2624: LastWriteTime: 2015-06-02T08:16:03.334057100Z 658.2624: ChangeTime: 2015-06-02T08:16:03.334057100Z 658.2624: FileAttributes: 0x20 658.2624: Size: 0x2b658 658.2624: NT Headers: 0xe8 658.2624: Timestamp: 0x51f32ff2 658.2624: Machine: 0x8664 - amd64 658.2624: Timestamp: 0x51f32ff2 658.2624: Image Version: 6.0 658.2624: SizeOfImage: 0x38000 (229376) 658.2624: Resource Dir: 0x36000 LB 0x3c8 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 658.2624: [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 658.2624: ProductName: SYMEVENT 658.2624: ProductVersion: 12.9.5.2 658.2624: FileVersion: 12.9.5.2 658.2624: FileDescription: Symantec Event Library 658.2624: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 658.2624: Calling main() 658.2624: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 658.2624: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 658.2624: SUPR3HardenedMain: Respawn #1 658.2624: System32: \Device\HarddiskVolume2\Windows\System32 658.2624: WinSxS: \Device\HarddiskVolume2\Windows\winsxs 658.2624: KnownDllPath: C:\Windows\system32 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 658.2624: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 658.2624: supR3HardNtEnableThreadCreation: 658.2624: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f3a360 pvNtTerminateThread=0000000076f5c260 658.2624: supR3HardenedWinDoReSpawn(1): New child 15a4.5e8 [kernel32]. 658.2624: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdf000 cbPeb=0x380 658.2624: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f10000 uNtDllChildAddr=0000000076f10000 658.2624: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f3a360 658.2624: supR3HardenedWinSetupChildInit: Start child. 658.2624: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 658.2624: 0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x1c0000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000000061000-000000000021ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 658.2624: 0000000000320000-0000000071a9ffff 0x0001/0x0000 0x0000000 658.2624: *0000000071aa0000-0000000071aa0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071aa0000 (LB 0x1000, 0000000071aa0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071aa0000/0000000071aa0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071aa0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071aa1000-0000000071aaffff 0x0001/0x0000 0x0000000 658.2624: *0000000071ab0000-0000000071ab0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ab0000 (LB 0x1000, 0000000071ab0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ab0000/0000000071ab0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ab0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071ab1000-0000000071abffff 0x0001/0x0000 0x0000000 658.2624: *0000000071ac0000-0000000071ac0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ac0000 (LB 0x1000, 0000000071ac0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ac0000/0000000071ac0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ac0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071ac1000-0000000071acffff 0x0001/0x0000 0x0000000 658.2624: *0000000071ad0000-0000000071ad0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ad0000 (LB 0x1000, 0000000071ad0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ad0000/0000000071ad0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ad0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071ad1000-0000000071adffff 0x0001/0x0000 0x0000000 658.2624: *0000000071ae0000-0000000071ae0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ae0000 (LB 0x1000, 0000000071ae0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ae0000/0000000071ae0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ae0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071ae1000-0000000071aeffff 0x0001/0x0000 0x0000000 658.2624: *0000000071af0000-0000000071af0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071af0000 (LB 0x1000, 0000000071af0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071af0000/0000000071af0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071af0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071af1000-0000000071afffff 0x0001/0x0000 0x0000000 658.2624: *0000000071b00000-0000000071b00fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071b00000 (LB 0x1000, 0000000071b00000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071b00000/0000000071b00000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071b00000 LB 0x5410000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 0000000071b01000-0000000076f0ffff 0x0001/0x0000 0x0000000 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000077048000-000000007704afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 658.2624: *000000013fde0000-000000013fde0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe51000-000000013fe51fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe97000-000000013fe97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe98000-000000013fe98fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe99000-000000013fe9dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe9e000-000000013fe9efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe9f000-000000013fe9ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fea0000-000000013fea3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013feec000-000000013feeffff 0x0001/0x0000 0x0000000 658.2624: *000000013fef0000-000000013fef0fff 0x0040/0x0040 0x0020000 !! 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fef0000 (LB 0x1000, 000000013fef0000 LB 0x1000) 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fef0000/000000013fef0000 LB 0/0x1000] 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fef0000 LB 0x7fdbf340000 s=0x10000 ap=0x0 rp=0x00000000000001 658.2624: 000000013fef1000-000007feff22ffff 0x0001/0x0000 0x0000000 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 658.2624: apisetschema.dll: timestamp 0x590296af (rc=VINF_SUCCESS) 658.2624: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS) 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 658.2624: VirtualBox.exe: Differences in section #0 (headers) between file and memory: 658.2624: 000000013fde0162 / 0x0000162: 00 != 11 658.2624: 000000013fde0164 / 0x0000164: 00 != b8 658.2624: 000000013fde0165 / 0x0000165: 00 != 01 658.2624: 000000013fde01b8 / 0x00001b8: 00 != b8 658.2624: 000000013fde01b9 / 0x00001b9: 00 != 01 658.2624: 000000013fde01ba / 0x00001ba: 00 != 11 658.2624: 000000013fde01bc / 0x00001bc: 00 != 20 658.2624: Restored 0x400 bytes of original file content at 000000013fde0000 658.2624: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports 658.2624: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports 658.2624: ntdll.dll: Differences in section #1 (.text) between file and memory: 658.2624: 0000000076f5d540 / 0x004d540: 4c != e9 658.2624: 0000000076f5d541 / 0x004d541: 8b != bb 658.2624: 0000000076f5d542 / 0x004d542: d1 != 2a 658.2624: 0000000076f5d543 / 0x004d543: b8 != b4 658.2624: 0000000076f5d544 / 0x004d544: 7e != fa 658.2624: Restored 0x2000 bytes of original file content at 0000000076f5c36e 658.2624: supR3HardNtChildPurify: cFixes=11 g_fSupAdversaries=0x3 cPatchCount=0 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 658.2624: 0000000000041000-000000000021ffff 0x0001/0x0000 0x0000000 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 658.2624: 0000000000320000-0000000076f0ffff 0x0001/0x0000 0x0000000 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000077048000-0000000077048fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 0000000077049000-000000007704afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 658.2624: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe51000-000000013fe51fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fe97000-000000013fea3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 658.2624: 000000013feec000-000007feff22ffff 0x0001/0x0000 0x0000000 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 658.2624: supR3HardNtChildPurify: Done after 4786 ms and 11 fixes (loop #1). 658.2624: supR3HardNtEnableThreadCreation: 15a4.5e8: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100 15a4.5e8: supR3HardenedVmProcessInit: uNtDllAddr=0000000076f10000 g_uNtVerCombined=0x611db100 15a4.5e8: ntdll.dll: timestamp 0x590296ce (rc=VINF_SUCCESS) 15a4.5e8: New simple heap: #1 0000000000320000 LB 0x400000 (for 1744896 allocation) 15a4.5e8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 15a4.5e8: System32: \Device\HarddiskVolume2\Windows\System32 15a4.5e8: WinSxS: \Device\HarddiskVolume2\Windows\winsxs 15a4.5e8: KnownDllPath: C:\Windows\system32 15a4.5e8: supR3HardenedVmProcessInit: Opening vboxdrv stub... 15a4.5e8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 15a4.5e8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 15a4.5e8: Registered Dll notification callback with NTDLL. 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000: [calling] 15a4.5e8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 15a4.5e8: supR3HardenedDllNotificationCallback: load 0000000076df0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0] 15a4.5e8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 15a4.5e8: supR3HardenedDllNotificationCallback: load 000007fefcc60000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0] 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076df0000 'C:\Windows\system32\kernel32.dll' 658.2624: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 796 ms, CloseEvents);