222c.1704: Log file opened: 5.0.0r101573 g_hStartupLog=0000000000000058 g_uNtVerCombined=0x611db110 222c.1704: \SystemRoot\System32\ntdll.dll: 222c.1704: CreationTime: 2015-06-15T00:44:20.364375900Z 222c.1704: LastWriteTime: 2015-05-25T18:21:21.289963400Z 222c.1704: ChangeTime: 2015-06-15T02:56:18.955596700Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x1a61c0 222c.1704: NT Headers: 0xe0 222c.1704: Timestamp: 0x556366f2 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x556366f2 222c.1704: Image Version: 6.1 222c.1704: SizeOfImage: 0x1a9000 (1740800) 222c.1704: Resource Dir: 0x14d000 LB 0x5a028 222c.1704: ProductName: Microsoft® Windows® Operating System 222c.1704: ProductVersion: 6.1.7601.18869 222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 222c.1704: FileDescription: NT Layer DLL 222c.1704: \SystemRoot\System32\kernel32.dll: 222c.1704: CreationTime: 2015-06-15T00:44:21.543170600Z 222c.1704: LastWriteTime: 2015-05-25T18:19:02.585000000Z 222c.1704: ChangeTime: 2015-06-15T02:56:19.813602200Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x11be00 222c.1704: NT Headers: 0xe8 222c.1704: Timestamp: 0x556366fc 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x556366fc 222c.1704: Image Version: 6.1 222c.1704: SizeOfImage: 0x11f000 (1175552) 222c.1704: Resource Dir: 0x116000 LB 0x528 222c.1704: ProductName: Microsoft® Windows® Operating System 222c.1704: ProductVersion: 6.1.7601.18869 222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 222c.1704: FileDescription: Windows NT BASE API Client DLL 222c.1704: \SystemRoot\System32\KernelBase.dll: 222c.1704: CreationTime: 2015-06-15T00:44:22.635163600Z 222c.1704: LastWriteTime: 2015-05-25T18:19:02.585000000Z 222c.1704: ChangeTime: 2015-06-15T02:56:19.813602200Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x67c00 222c.1704: NT Headers: 0xe8 222c.1704: Timestamp: 0x556366fd 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x556366fd 222c.1704: Image Version: 6.1 222c.1704: SizeOfImage: 0x6c000 (442368) 222c.1704: Resource Dir: 0x6a000 LB 0x530 222c.1704: ProductName: Microsoft® Windows® Operating System 222c.1704: ProductVersion: 6.1.7601.18869 222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 222c.1704: FileDescription: Windows NT BASE API Client DLL 222c.1704: \SystemRoot\System32\apisetschema.dll: 222c.1704: CreationTime: 2015-06-15T00:44:16.695694100Z 222c.1704: LastWriteTime: 2015-05-25T18:11:40.254000000Z 222c.1704: ChangeTime: 2015-06-15T02:56:18.924396500Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x1a00 222c.1704: NT Headers: 0xc0 222c.1704: Timestamp: 0x55636622 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x55636622 222c.1704: Image Version: 6.1 222c.1704: SizeOfImage: 0x50000 (327680) 222c.1704: Resource Dir: 0x30000 LB 0x3f8 222c.1704: ProductName: Microsoft® Windows® Operating System 222c.1704: ProductVersion: 6.1.7601.18869 222c.1704: FileVersion: 6.1.7601.18869 (win7sp1_gdr.150525-0603) 222c.1704: FileDescription: ApiSet Schema DLL 222c.1704: Found driver SysPlant (0x1) 222c.1704: Found driver SymNetS (0x2) 222c.1704: Found driver SymDS (0x2) 222c.1704: Found driver SRTSPX (0x2) 222c.1704: Found driver SymEvent (0x2) 222c.1704: Found driver SymIRON (0x2) 222c.1704: supR3HardenedWinFindAdversaries: 0x3 222c.1704: \SystemRoot\System32\drivers\SysPlant.sys: 222c.1704: CreationTime: 2013-08-15T07:14:36.223563800Z 222c.1704: LastWriteTime: 2014-09-18T01:26:52.026822000Z 222c.1704: ChangeTime: 2014-09-18T01:26:52.026822000Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x25f50 222c.1704: NT Headers: 0x100 222c.1704: Timestamp: 0x53da082a 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x53da082a 222c.1704: Image Version: 5.0 222c.1704: SizeOfImage: 0x2d000 (184320) 222c.1704: Resource Dir: 0x2b000 LB 0x498 222c.1704: ProductName: Symantec CMC Firewall 222c.1704: ProductVersion: 12.1.4112.4156 222c.1704: FileVersion: 12.1.4112.4156 222c.1704: FileDescription: Symantec CMC Firewall SysPlant 222c.1704: \SystemRoot\System32\sysfer.dll: 222c.1704: CreationTime: 2013-08-15T07:14:36.207963700Z 222c.1704: LastWriteTime: 2014-09-18T01:26:51.964421900Z 222c.1704: ChangeTime: 2014-09-18T01:26:51.964421900Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x70d70 222c.1704: NT Headers: 0xe8 222c.1704: Timestamp: 0x53da08b7 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x53da08b7 222c.1704: Image Version: 0.0 222c.1704: SizeOfImage: 0x88000 (557056) 222c.1704: Resource Dir: 0x86000 LB 0x630 222c.1704: ProductName: Symantec CMC Firewall 222c.1704: ProductVersion: 12.1.4112.4156 222c.1704: FileVersion: 12.1.4112.4156 222c.1704: FileDescription: Symantec CMC Firewall sysfer 222c.1704: \SystemRoot\System32\sysferThunk.dll: 222c.1704: CreationTime: 2013-08-15T07:14:36.207963700Z 222c.1704: LastWriteTime: 2014-09-18T01:26:51.980021900Z 222c.1704: ChangeTime: 2014-09-18T01:26:51.980021900Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x3170 222c.1704: NT Headers: 0xd0 222c.1704: Timestamp: 0x53da08b8 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x53da08b8 222c.1704: Image Version: 0.0 222c.1704: SizeOfImage: 0x8000 (32768) 222c.1704: Resource Dir: 0x6000 LB 0x648 222c.1704: ProductName: Symantec CMC Firewall 222c.1704: ProductVersion: 12.1.4112.4156 222c.1704: FileVersion: 12.1.4112.4156 222c.1704: FileDescription: Symantec CMC Firewall SysferThunk 222c.1704: \SystemRoot\System32\drivers\symevent64x86.sys: 222c.1704: CreationTime: 2013-08-15T07:14:52.322792000Z 222c.1704: LastWriteTime: 2014-09-17T04:58:16.559956600Z 222c.1704: ChangeTime: 2014-09-17T04:58:16.559956600Z 222c.1704: FileAttributes: 0x20 222c.1704: Size: 0x2b658 222c.1704: NT Headers: 0xe8 222c.1704: Timestamp: 0x51f32ff2 222c.1704: Machine: 0x8664 - amd64 222c.1704: Timestamp: 0x51f32ff2 222c.1704: Image Version: 6.0 222c.1704: SizeOfImage: 0x38000 (229376) 222c.1704: Resource Dir: 0x36000 LB 0x3c8 222c.1704: ProductName: SYMEVENT 222c.1704: ProductVersion: 12.9.5.2 222c.1704: FileVersion: 12.9.5.2 222c.1704: FileDescription: Symantec Event Library 222c.1704: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox' 222c.1704: Calling main() 222c.1704: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 222c.1704: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox' 222c.1704: SUPR3HardenedMain: Respawn #1 222c.1704: System32: \Device\HarddiskVolume1\Windows\System32 222c.1704: WinSxS: \Device\HarddiskVolume1\Windows\winsxs 222c.1704: KnownDllPath: C:\windows\system32 222c.1704: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 222c.1704: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe) 222c.1704: supR3HardNtEnableThreadCreation: 222c.1704: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000077cbb780 pvNtTerminateThread=0000000077cde0e0 222c.1704: supR3HardenedWinDoReSpawn(1): New child 2244.1cb8 [kernel32]. 222c.1704: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd4000 cbPeb=0x380 222c.1704: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077c90000 uNtDllChildAddr=0000000077c90000 222c.1704: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000077cbb780 222c.1704: supR3HardenedWinSetupChildInit: Start child. 222c.1704: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 222c.1704: supR3HardNtChildPurify: Startup delay kludge #1/0: 520 ms, 65 sleeps 222c.1704: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 222c.1704: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000 222c.1704: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000 222c.1704: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000 222c.1704: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000 222c.1704: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000 222c.1704: 0000000000041000-0000000000031fff 0x0001/0x0000 0x0000000 222c.1704: *0000000000050000-000000000004efff 0x0040/0x0040 0x0020000 !! 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000050000 (LB 0x1000, 0000000000050000 LB 0x1000) 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000050000/0000000000050000 LB 0/0x1000] 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000050000 LB 0x30000 s=0x10000 ap=0x0 rp=0x00000000000001 222c.1704: 0000000000051000-0000000000021fff 0x0001/0x0000 0x0000000 222c.1704: *0000000000080000-fffffffffff83fff 0x0000/0x0004 0x0020000 222c.1704: 000000000017c000-0000000000178fff 0x0104/0x0004 0x0020000 222c.1704: 000000000017f000-000000000017dfff 0x0004/0x0004 0x0020000 222c.1704: 0000000000180000-ffffffff8866ffff 0x0001/0x0000 0x0000000 222c.1704: *0000000077c90000-0000000077c90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077c91000-0000000077d8efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077d8f000-0000000077dbdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dbe000-0000000077dc5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dc6000-0000000077dc6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dc7000-0000000077dc9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dca000-0000000077e38fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077e39000-0000000070c91fff 0x0001/0x0000 0x0000000 222c.1704: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000 222c.1704: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000 222c.1704: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000 222c.1704: 000000007fff0000-ffffffffc031ffff 0x0001/0x0000 0x0000000 222c.1704: *000000013fcc0000-000000013fcc0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fcc1000-000000013fd46fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd47000-000000013fd47fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd48000-000000013fd91fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd92000-000000013fd92fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd93000-000000013fd93fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd94000-000000013fd95fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd96000-000000013fd96fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd97000-000000013fd97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd98000-000000013fd9bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd9c000-000000013fde5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fde6000-000000013fddbfff 0x0001/0x0000 0x0000000 222c.1704: *000000013fdf0000-000000013fdeefff 0x0040/0x0040 0x0020000 !! 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fdf0000 (LB 0x1000, 000000013fdf0000 LB 0x1000) 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fdf0000/000000013fdf0000 LB 0/0x1000] 222c.1704: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fdf0000 LB 0x7fdc01c0000 s=0x10000 ap=0x0 rp=0x00000000000001 222c.1704: 000000013fdf1000-fffff8037fc31fff 0x0001/0x0000 0x0000000 222c.1704: *000007fefffb0000-000007fefffb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll 222c.1704: 000007fefffb1000-000007fdfffc1fff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffa0000-000007fffff6cfff 0x0002/0x0002 0x0040000 222c.1704: 000007fffffd3000-000007fffffd1fff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffd4000-000007fffffd2fff 0x0004/0x0004 0x0020000 222c.1704: 000007fffffd5000-000007fffffcbfff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000 222c.1704: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000 222c.1704: apisetschema.dll: timestamp 0x55636622 (rc=VINF_SUCCESS) 222c.1704: VirtualBox.exe: timestamp 0x559e485f (rc=VINF_SUCCESS) 222c.1704: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 222c.1704: VirtualBox.exe: Differences in section #0 (headers) between file and memory: 222c.1704: 000000013fcc016a / 0x000016a: 00 != 13 222c.1704: 000000013fcc016c / 0x000016c: 00 != cc 222c.1704: 000000013fcc016d / 0x000016d: 00 != 01 222c.1704: 000000013fcc01c0 / 0x00001c0: 00 != cc 222c.1704: 000000013fcc01c1 / 0x00001c1: 00 != 01 222c.1704: 000000013fcc01c2 / 0x00001c2: 00 != 13 222c.1704: 000000013fcc01c4 / 0x00001c4: 00 != 20 222c.1704: Restored 0x400 bytes of original file content at 000000013fcc0000 222c.1704: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports 222c.1704: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports 222c.1704: supR3HardNtChildPurify: cFixes=3 g_fSupAdversaries=0x3 cPatchCount=0 222c.1704: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 54 sleeps 222c.1704: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 222c.1704: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000 222c.1704: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000 222c.1704: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000 222c.1704: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000 222c.1704: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000 222c.1704: 0000000000041000-0000000000001fff 0x0001/0x0000 0x0000000 222c.1704: *0000000000080000-fffffffffff83fff 0x0000/0x0004 0x0020000 222c.1704: 000000000017c000-0000000000178fff 0x0104/0x0004 0x0020000 222c.1704: 000000000017f000-000000000017dfff 0x0004/0x0004 0x0020000 222c.1704: 0000000000180000-ffffffff8866ffff 0x0001/0x0000 0x0000000 222c.1704: *0000000077c90000-0000000077c90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077c91000-0000000077d8efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077d8f000-0000000077dbdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dbe000-0000000077dc5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dc6000-0000000077dc6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dc7000-0000000077dc7fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dc8000-0000000077dc9fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077dca000-0000000077e38fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll 222c.1704: 0000000077e39000-0000000070c91fff 0x0001/0x0000 0x0000000 222c.1704: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000 222c.1704: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000 222c.1704: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000 222c.1704: 000000007fff0000-ffffffffc031ffff 0x0001/0x0000 0x0000000 222c.1704: *000000013fcc0000-000000013fcc0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fcc1000-000000013fd46fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd47000-000000013fd47fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd48000-000000013fd91fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd92000-000000013fd9bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fd9c000-000000013fde5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe 222c.1704: 000000013fde6000-fffff8037fc1bfff 0x0001/0x0000 0x0000000 222c.1704: *000007fefffb0000-000007fefffb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll 222c.1704: 000007fefffb1000-000007fdfffc1fff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffa0000-000007fffff6cfff 0x0002/0x0002 0x0040000 222c.1704: 000007fffffd3000-000007fffffd1fff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffd4000-000007fffffd2fff 0x0004/0x0004 0x0020000 222c.1704: 000007fffffd5000-000007fffffcbfff 0x0001/0x0000 0x0000000 222c.1704: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000 222c.1704: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000 222c.1704: supR3HardNtChildPurify: Done after 1236 ms and 3 fixes (loop #1). 222c.1704: supR3HardNtEnableThreadCreation: 2244.1cb8: Log file opened: 5.0.0r101573 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db110 2244.1cb8: supR3HardenedVmProcessInit: uNtDllAddr=0000000077c90000 2244.1cb8: ntdll.dll: timestamp 0x556366f2 (rc=VINF_SUCCESS) 2244.1cb8: New simple heap: #1 0000000000280000 LB 0x400000 (for 1740800 allocation) 2244.1cb8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox' 2244.1cb8: System32: \Device\HarddiskVolume1\Windows\System32 2244.1cb8: WinSxS: \Device\HarddiskVolume1\Windows\winsxs 2244.1cb8: KnownDllPath: C:\windows\system32 2244.1cb8: supR3HardenedVmProcessInit: Opening vboxdrv stub... 2244.1cb8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 2244.1cb8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 2244.1cb8: Registered Dll notification callback with NTDLL. 2244.1cb8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll) 2244.1cb8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll 2244.1cb8: supR3HardenedMonitor_LdrLoadDll: pName=C:\windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000: [calling] 2244.1cb8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 2244.1cb8: supR3HardenedDllNotificationCallback: load 0000000077a70000 LB 0x0011f000 C:\windows\system32\kernel32.dll [fFlags=0x0] 2244.1cb8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 2244.1cb8: supR3HardenedDllNotificationCallback: load 000007fefdad0000 LB 0x0006c000 C:\windows\system32\KERNELBASE.dll [fFlags=0x0] 2244.1cb8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll) 2244.1cb8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll 2244.1cb8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000077a70000 'C:\windows\system32\kernel32.dll' 222c.1704: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 77 ms, CloseEvents);