8a8.12d4: Log file opened: 5.0.0r101573 g_hStartupLog=00000058 g_uNtVerCombined=0xa0280000 8a8.12d4: \SystemRoot\System32\ntdll.dll: 8a8.12d4: CreationTime: 2015-07-24T03:23:33.225736800Z 8a8.12d4: LastWriteTime: 2015-07-24T03:23:33.241361000Z 8a8.12d4: ChangeTime: 2015-07-24T03:25:49.491626600Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x176c38 8a8.12d4: NT Headers: 0xf0 8a8.12d4: Timestamp: 0x55a85cc1 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x55a85cc1 8a8.12d4: Image Version: 10.0 8a8.12d4: SizeOfImage: 0x179000 (1544192) 8a8.12d4: Resource Dir: 0x10e000 LB 0x65720 8a8.12d4: ProductName: Microsoft® Windows® Operating System 8a8.12d4: ProductVersion: 10.0.10240.16392 8a8.12d4: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608) 8a8.12d4: FileDescription: NT Layer DLL 8a8.12d4: \SystemRoot\System32\kernel32.dll: 8a8.12d4: CreationTime: 2015-07-10T08:24:38.139724700Z 8a8.12d4: LastWriteTime: 2015-07-10T08:24:38.139724700Z 8a8.12d4: ChangeTime: 2015-07-24T02:59:37.566677800Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x986b8 8a8.12d4: NT Headers: 0xf8 8a8.12d4: Timestamp: 0x559f3b86 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x559f3b86 8a8.12d4: Image Version: 10.0 8a8.12d4: SizeOfImage: 0x95000 (610304) 8a8.12d4: Resource Dir: 0x8f000 LB 0x518 8a8.12d4: ProductName: Microsoft® Windows® Operating System 8a8.12d4: ProductVersion: 10.0.10240.16384 8a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700) 8a8.12d4: FileDescription: Windows NT BASE API Client DLL 8a8.12d4: \SystemRoot\System32\KernelBase.dll: 8a8.12d4: CreationTime: 2015-07-10T08:24:56.031660300Z 8a8.12d4: LastWriteTime: 2015-07-10T08:24:56.047288800Z 8a8.12d4: ChangeTime: 2015-07-24T02:59:37.707301500Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x175610 8a8.12d4: NT Headers: 0xf0 8a8.12d4: Timestamp: 0x559f3b4c 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x559f3b4c 8a8.12d4: Image Version: 10.0 8a8.12d4: SizeOfImage: 0x177000 (1536000) 8a8.12d4: Resource Dir: 0x15b000 LB 0x530 8a8.12d4: ProductName: Microsoft® Windows® Operating System 8a8.12d4: ProductVersion: 10.0.10240.16384 8a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700) 8a8.12d4: FileDescription: Windows NT BASE API Client DLL 8a8.12d4: \SystemRoot\System32\apisetschema.dll: 8a8.12d4: CreationTime: 2015-07-10T08:24:49.281165400Z 8a8.12d4: LastWriteTime: 2015-07-10T08:24:49.281165400Z 8a8.12d4: ChangeTime: 2015-07-24T02:59:29.910411200Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x16560 8a8.12d4: NT Headers: 0xc8 8a8.12d4: Timestamp: 0x559f4063 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x559f4063 8a8.12d4: Image Version: 10.0 8a8.12d4: SizeOfImage: 0x17000 (94208) 8a8.12d4: Resource Dir: 0x16000 LB 0x3f0 8a8.12d4: ProductName: Microsoft® Windows® Operating System 8a8.12d4: ProductVersion: 10.0.10240.16384 8a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700) 8a8.12d4: FileDescription: ApiSet Schema DLL 8a8.12d4: NtOpenDirectoryObject failed on \Driver: 0xc0000022 8a8.12d4: supR3HardenedWinFindAdversaries: 0x80 8a8.12d4: \SystemRoot\System32\drivers\MBAMSwissArmy.sys: 8a8.12d4: CreationTime: 2015-07-29T17:54:56.857320100Z 8a8.12d4: LastWriteTime: 2015-07-29T17:57:10.621467300Z 8a8.12d4: ChangeTime: 2015-07-29T17:57:10.621467300Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x180d8 8a8.12d4: NT Headers: 0xe0 8a8.12d4: Timestamp: 0x552c18fe 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x552c18fe 8a8.12d4: Image Version: 6.1 8a8.12d4: SizeOfImage: 0x1c000 (114688) 8a8.12d4: Resource Dir: 0x1a000 LB 0x3f0 8a8.12d4: ProductName: Malwarebytes Anti-Malware 8a8.12d4: ProductVersion: 0.2.22.0 8a8.12d4: FileVersion: 0.2.22.0 8a8.12d4: FileDescription: Malwarebytes Anti-Malware 8a8.12d4: \SystemRoot\System32\drivers\mwac.sys: 8a8.12d4: CreationTime: 2015-07-29T17:54:25.761614300Z 8a8.12d4: LastWriteTime: 2015-06-18T15:41:58.000000000Z 8a8.12d4: ChangeTime: 2015-07-29T17:54:25.822618100Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0xcad8 8a8.12d4: NT Headers: 0xe8 8a8.12d4: Timestamp: 0x53a0f437 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x53a0f437 8a8.12d4: Image Version: 6.2 8a8.12d4: SizeOfImage: 0xf000 (61440) 8a8.12d4: Resource Dir: 0xd000 LB 0x3e0 8a8.12d4: ProductName: Malwarebytes Web Access Control 8a8.12d4: ProductVersion: 1.0.6.0 8a8.12d4: FileVersion: 1.0.6.0 8a8.12d4: FileDescription: Malwarebytes Web Access Control 8a8.12d4: \SystemRoot\System32\drivers\mbamchameleon.sys: 8a8.12d4: CreationTime: 2015-07-29T17:54:25.826617800Z 8a8.12d4: LastWriteTime: 2015-06-18T15:41:42.000000000Z 8a8.12d4: ChangeTime: 2015-07-29T17:54:25.943624500Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x172d8 8a8.12d4: NT Headers: 0xd0 8a8.12d4: Timestamp: 0x554cf747 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x554cf747 8a8.12d4: Image Version: 6.1 8a8.12d4: SizeOfImage: 0x1b000 (110592) 8a8.12d4: Resource Dir: 0x18000 LB 0xbd8 8a8.12d4: ProductName: Malwarebytes Chameleon 8a8.12d4: ProductVersion: 1.1.20.0 8a8.12d4: FileVersion: 1.1.20.0 8a8.12d4: FileDescription: Malwarebytes Chameleon Protection Driver 8a8.12d4: \SystemRoot\System32\drivers\mbam.sys: 8a8.12d4: CreationTime: 2015-07-29T17:54:25.702610600Z 8a8.12d4: LastWriteTime: 2015-06-18T15:41:36.000000000Z 8a8.12d4: ChangeTime: 2015-07-29T17:54:25.758613500Z 8a8.12d4: FileAttributes: 0x20 8a8.12d4: Size: 0x5ad8 8a8.12d4: NT Headers: 0xd8 8a8.12d4: Timestamp: 0x540754db 8a8.12d4: Machine: 0x14c - i386 8a8.12d4: Timestamp: 0x540754db 8a8.12d4: Image Version: 6.1 8a8.12d4: SizeOfImage: 0x9000 (36864) 8a8.12d4: Resource Dir: 0x7000 LB 0x3d0 8a8.12d4: ProductName: Malwarebytes Anti-Malware 8a8.12d4: ProductVersion: 0.1.15.0 8a8.12d4: FileVersion: 0.1.15.0 8a8.12d4: FileDescription: Malwarebytes Anti-Malware 8a8.12d4: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 8a8.12d4: Calling main() 8a8.12d4: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 8a8.12d4: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 8a8.12d4: SUPR3HardenedMain: Respawn #1 8a8.12d4: System32: \Device\HarddiskVolume2\Windows\System32 8a8.12d4: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS 8a8.12d4: KnownDllPath: C:\WINDOWS\system32 8a8.12d4: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 8a8.12d4: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 8a8.12d4: supR3HardNtEnableThreadCreation: 8a8.12d4: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10 8a8.12d4: supR3HardenedWinDoReSpawn(1): New child 1f58.120c [kernel32]. 8a8.12d4: supR3HardNtChildGatherData: PebBaseAddress=7f8c9000 cbPeb=0x250 8a8.12d4: supR3HardNtPuChFindNtdll: uNtDllParentAddr=77120000 uNtDllChildAddr=77120000 8a8.12d4: supR3HardenedWinSetupChildInit: uLdrInitThunk=77192e70 8a8.12d4: supR3HardenedWinSetupChildInit: Start child. 8a8.12d4: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 8a8.12d4: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 0 sleeps 8a8.12d4: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 8a8.12d4: *00000000-ff96ffff 0x0001/0x0000 0x0000000 8a8.12d4: *00690000-0066ffff 0x0004/0x0004 0x0020000 8a8.12d4: *006b0000-0069bfff 0x0002/0x0002 0x0040000 8a8.12d4: 006c4000-006b7fff 0x0001/0x0000 0x0000000 8a8.12d4: *006d0000-005d2fff 0x0000/0x0004 0x0020000 8a8.12d4: 007cd000-007cafff 0x0104/0x0004 0x0020000 8a8.12d4: 007cf000-007cdfff 0x0004/0x0004 0x0020000 8a8.12d4: *007d0000-007cbfff 0x0002/0x0002 0x0040000 8a8.12d4: 007d4000-007c7fff 0x0001/0x0000 0x0000000 8a8.12d4: *007e0000-007ddfff 0x0004/0x0004 0x0020000 8a8.12d4: 007e2000-00123fff 0x0001/0x0000 0x0000000 8a8.12d4: *00ea0000-00ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00ea1000-00f16fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f17000-00f17fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f18000-00f51fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f52000-00f52fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f53000-00f53fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f54000-00f54fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f55000-00f55fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f56000-00f57fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f58000-00f5afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f5b000-00f9efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 8a8.12d4: 00f9f000-8ae1dfff 0x0001/0x0000 0x0000000 8a8.12d4: *77120000-77120fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 77121000-77225fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 77226000-7722afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 7722b000-7722bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 7722c000-7722dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 7722e000-77298fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 8a8.12d4: 77299000-6ec91fff 0x0001/0x0000 0x0000000 8a8.12d4: *7f8a0000-7f87cfff 0x0002/0x0002 0x0040000 8a8.12d4: 7f8c3000-7f8bcfff 0x0001/0x0000 0x0000000 8a8.12d4: *7f8c9000-7f8c7fff 0x0004/0x0004 0x0020000 8a8.12d4: 7f8ca000-7f8c4fff 0x0001/0x0000 0x0000000 8a8.12d4: *7f8cf000-7f8cdfff 0x0004/0x0004 0x0020000 8a8.12d4: 7f8d0000-7f1bffff 0x0001/0x0000 0x0000000 8a8.12d4: *7ffe0000-7ffdefff 0x0002/0x0002 0x0020000 8a8.12d4: 7ffe1000-7ffd1fff 0x0001/0x0002 0x0020000 8a8.12d4: VirtualBox.exe: timestamp 0x559e4a2c (rc=VINF_SUCCESS) 8a8.12d4: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 8a8.12d4: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports 8a8.12d4: supR3HardNtChildPurify: Done after 609 ms and 0 fixes (loop #0). 1f58.120c: Log file opened: 5.0.0r101573 g_hStartupLog=00000004 g_uNtVerCombined=0xa0280000 1f58.120c: supR3HardenedVmProcessInit: uNtDllAddr=77120000 8a8.12d4: supR3HardNtEnableThreadCreation: 1f58.120c: ntdll.dll: timestamp 0x55a85cc1 (rc=VINF_SUCCESS) 1f58.120c: New simple heap: #1 008f0000 LB 0x400000 (for 1544192 allocation) 1f58.120c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1f58.120c: System32: \Device\HarddiskVolume2\Windows\System32 1f58.120c: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS 1f58.120c: KnownDllPath: C:\WINDOWS\system32 1f58.120c: supR3HardenedVmProcessInit: Opening vboxdrv stub... 1f58.120c: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 1f58.120c: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 1f58.120c: Registered Dll notification callback with NTDLL. 1f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) 1f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll 1f58.120c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=00000801: [calling] 1f58.120c: supR3HardenedDllNotificationCallback: load 74820000 LB 0x00177000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0] 1f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) 1f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll 1f58.120c: supR3HardenedDllNotificationCallback: load 74f40000 LB 0x00095000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0] 1f58.120c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 1f58.120c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\KERNEL32.DLL' 1f58.120c: supR3HardenedDllNotificationCallback: load 00ea0000 LB 0x000ff000 C:\Program Files\Oracle\VirtualBox\VirtualBox.exe [fFlags=0x0] 1f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 1f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10 8a8.12d4: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 218 ms. 1f58.120c: \SystemRoot\System32\ntdll.dll: 1f58.120c: CreationTime: 2015-07-24T03:23:33.225736800Z 1f58.120c: LastWriteTime: 2015-07-24T03:23:33.241361000Z 1f58.120c: ChangeTime: 2015-07-24T03:25:49.491626600Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x176c38 1f58.120c: NT Headers: 0xf0 1f58.120c: Timestamp: 0x55a85cc1 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x55a85cc1 1f58.120c: Image Version: 10.0 1f58.120c: SizeOfImage: 0x179000 (1544192) 1f58.120c: Resource Dir: 0x10e000 LB 0x65720 1f58.120c: ProductName: Microsoft® Windows® Operating System 1f58.120c: ProductVersion: 10.0.10240.16392 1f58.120c: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608) 1f58.120c: FileDescription: NT Layer DLL 1f58.120c: \SystemRoot\System32\kernel32.dll: 1f58.120c: CreationTime: 2015-07-10T08:24:38.139724700Z 1f58.120c: LastWriteTime: 2015-07-10T08:24:38.139724700Z 1f58.120c: ChangeTime: 2015-07-24T02:59:37.566677800Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x986b8 1f58.120c: NT Headers: 0xf8 1f58.120c: Timestamp: 0x559f3b86 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x559f3b86 1f58.120c: Image Version: 10.0 1f58.120c: SizeOfImage: 0x95000 (610304) 1f58.120c: Resource Dir: 0x8f000 LB 0x518 1f58.120c: ProductName: Microsoft® Windows® Operating System 1f58.120c: ProductVersion: 10.0.10240.16384 1f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700) 1f58.120c: FileDescription: Windows NT BASE API Client DLL 1f58.120c: \SystemRoot\System32\KernelBase.dll: 1f58.120c: CreationTime: 2015-07-10T08:24:56.031660300Z 1f58.120c: LastWriteTime: 2015-07-10T08:24:56.047288800Z 1f58.120c: ChangeTime: 2015-07-24T02:59:37.707301500Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x175610 1f58.120c: NT Headers: 0xf0 1f58.120c: Timestamp: 0x559f3b4c 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x559f3b4c 1f58.120c: Image Version: 10.0 1f58.120c: SizeOfImage: 0x177000 (1536000) 1f58.120c: Resource Dir: 0x15b000 LB 0x530 1f58.120c: ProductName: Microsoft® Windows® Operating System 1f58.120c: ProductVersion: 10.0.10240.16384 1f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700) 1f58.120c: FileDescription: Windows NT BASE API Client DLL 1f58.120c: \SystemRoot\System32\apisetschema.dll: 1f58.120c: CreationTime: 2015-07-10T08:24:49.281165400Z 1f58.120c: LastWriteTime: 2015-07-10T08:24:49.281165400Z 1f58.120c: ChangeTime: 2015-07-24T02:59:29.910411200Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x16560 1f58.120c: NT Headers: 0xc8 1f58.120c: Timestamp: 0x559f4063 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x559f4063 1f58.120c: Image Version: 10.0 1f58.120c: SizeOfImage: 0x17000 (94208) 1f58.120c: Resource Dir: 0x16000 LB 0x3f0 1f58.120c: ProductName: Microsoft® Windows® Operating System 1f58.120c: ProductVersion: 10.0.10240.16384 1f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700) 1f58.120c: FileDescription: ApiSet Schema DLL 1f58.120c: NtOpenDirectoryObject failed on \Driver: 0xc0000022 1f58.120c: supR3HardenedWinFindAdversaries: 0x80 1f58.120c: \SystemRoot\System32\drivers\MBAMSwissArmy.sys: 1f58.120c: CreationTime: 2015-07-29T17:54:56.857320100Z 1f58.120c: LastWriteTime: 2015-07-29T17:57:10.621467300Z 1f58.120c: ChangeTime: 2015-07-29T17:57:10.621467300Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x180d8 1f58.120c: NT Headers: 0xe0 1f58.120c: Timestamp: 0x552c18fe 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x552c18fe 1f58.120c: Image Version: 6.1 1f58.120c: SizeOfImage: 0x1c000 (114688) 1f58.120c: Resource Dir: 0x1a000 LB 0x3f0 1f58.120c: ProductName: Malwarebytes Anti-Malware 1f58.120c: ProductVersion: 0.2.22.0 1f58.120c: FileVersion: 0.2.22.0 1f58.120c: FileDescription: Malwarebytes Anti-Malware 1f58.120c: \SystemRoot\System32\drivers\mwac.sys: 1f58.120c: CreationTime: 2015-07-29T17:54:25.761614300Z 1f58.120c: LastWriteTime: 2015-06-18T15:41:58.000000000Z 1f58.120c: ChangeTime: 2015-07-29T17:54:25.822618100Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0xcad8 1f58.120c: NT Headers: 0xe8 1f58.120c: Timestamp: 0x53a0f437 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x53a0f437 1f58.120c: Image Version: 6.2 1f58.120c: SizeOfImage: 0xf000 (61440) 1f58.120c: Resource Dir: 0xd000 LB 0x3e0 1f58.120c: ProductName: Malwarebytes Web Access Control 1f58.120c: ProductVersion: 1.0.6.0 1f58.120c: FileVersion: 1.0.6.0 1f58.120c: FileDescription: Malwarebytes Web Access Control 1f58.120c: \SystemRoot\System32\drivers\mbamchameleon.sys: 1f58.120c: CreationTime: 2015-07-29T17:54:25.826617800Z 1f58.120c: LastWriteTime: 2015-06-18T15:41:42.000000000Z 1f58.120c: ChangeTime: 2015-07-29T17:54:25.943624500Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x172d8 1f58.120c: NT Headers: 0xd0 1f58.120c: Timestamp: 0x554cf747 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x554cf747 1f58.120c: Image Version: 6.1 1f58.120c: SizeOfImage: 0x1b000 (110592) 1f58.120c: Resource Dir: 0x18000 LB 0xbd8 1f58.120c: ProductName: Malwarebytes Chameleon 1f58.120c: ProductVersion: 1.1.20.0 1f58.120c: FileVersion: 1.1.20.0 1f58.120c: FileDescription: Malwarebytes Chameleon Protection Driver 1f58.120c: \SystemRoot\System32\drivers\mbam.sys: 1f58.120c: CreationTime: 2015-07-29T17:54:25.702610600Z 1f58.120c: LastWriteTime: 2015-06-18T15:41:36.000000000Z 1f58.120c: ChangeTime: 2015-07-29T17:54:25.758613500Z 1f58.120c: FileAttributes: 0x20 1f58.120c: Size: 0x5ad8 1f58.120c: NT Headers: 0xd8 1f58.120c: Timestamp: 0x540754db 1f58.120c: Machine: 0x14c - i386 1f58.120c: Timestamp: 0x540754db 1f58.120c: Image Version: 6.1 1f58.120c: SizeOfImage: 0x9000 (36864) 1f58.120c: Resource Dir: 0x7000 LB 0x3d0 1f58.120c: ProductName: Malwarebytes Anti-Malware 1f58.120c: ProductVersion: 0.1.15.0 1f58.120c: FileVersion: 0.1.15.0 1f58.120c: FileDescription: Malwarebytes Anti-Malware 1f58.120c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1f58.120c: Calling main() 1f58.120c: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 1f58.120c: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 1f58.120c: SUPR3HardenedMain: Respawn #2 1f58.120c: supR3HardNtEnableThreadCreation: 1f58.120c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10 1f58.120c: supR3HardenedWinDoReSpawn(2): New child 370.6d0 [kernel32]. 1f58.120c: supR3HardenedWinReSpawn: NtSetInformationThread/ThreadHideFromDebugger failed: 0xc0000022 (harmless) 1f58.120c: supR3HardNtChildGatherData: PebBaseAddress=7fa14000 cbPeb=0x250 1f58.120c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=77120000 uNtDllChildAddr=77120000 1f58.120c: supR3HardenedWinSetupChildInit: uLdrInitThunk=77192e70 1f58.120c: supR3HardenedWinSetupChildInit: Start child. 1f58.120c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 1f58.120c: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 0 sleeps 1f58.120c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1f58.120c: *00000000-ffd8ffff 0x0001/0x0000 0x0000000 1f58.120c: *00270000-0024ffff 0x0004/0x0004 0x0020000 1f58.120c: *00290000-0027bfff 0x0002/0x0002 0x0040000 1f58.120c: 002a4000-00297fff 0x0001/0x0000 0x0000000 1f58.120c: *002b0000-001b2fff 0x0000/0x0004 0x0020000 1f58.120c: 003ad000-003aafff 0x0104/0x0004 0x0020000 1f58.120c: 003af000-003adfff 0x0004/0x0004 0x0020000 1f58.120c: *003b0000-003abfff 0x0002/0x0002 0x0040000 1f58.120c: 003b4000-003a7fff 0x0001/0x0000 0x0000000 1f58.120c: *003c0000-003bdfff 0x0004/0x0004 0x0020000 1f58.120c: 003c2000-ff8e3fff 0x0001/0x0000 0x0000000 1f58.120c: *00ea0000-00ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00ea1000-00f16fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f17000-00f17fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f18000-00f51fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f52000-00f52fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f53000-00f53fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f54000-00f54fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f55000-00f55fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f56000-00f57fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f58000-00f5afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f5b000-00f9efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1f58.120c: 00f9f000-8ae1dfff 0x0001/0x0000 0x0000000 1f58.120c: *77120000-77120fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 77121000-77225fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 77226000-7722afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 7722b000-7722bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 7722c000-7722dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 7722e000-77298fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1f58.120c: 77299000-6eb41fff 0x0001/0x0000 0x0000000 1f58.120c: *7f9f0000-7f9ccfff 0x0002/0x0002 0x0040000 1f58.120c: 7fa13000-7fa11fff 0x0001/0x0000 0x0000000 1f58.120c: *7fa14000-7fa12fff 0x0004/0x0004 0x0020000 1f58.120c: 7fa15000-7fa0afff 0x0001/0x0000 0x0000000 1f58.120c: *7fa1f000-7fa1dfff 0x0004/0x0004 0x0020000 1f58.120c: 7fa20000-7f45ffff 0x0001/0x0000 0x0000000 1f58.120c: *7ffe0000-7ffdefff 0x0002/0x0002 0x0020000 1f58.120c: 7ffe1000-7ffd1fff 0x0001/0x0002 0x0020000 1f58.120c: VirtualBox.exe: timestamp 0x559e4a2c (rc=VINF_SUCCESS) 1f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1f58.120c: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports 1f58.120c: supR3HardNtChildPurify: Done after 611 ms and 0 fixes (loop #0). 370.6d0: Log file opened: 5.0.0r101573 g_hStartupLog=00000004 g_uNtVerCombined=0xa0280000 370.6d0: supR3HardenedVmProcessInit: uNtDllAddr=77120000 370.6d0: ntdll.dll: timestamp 0x55a85cc1 (rc=VINF_SUCCESS) 370.6d0: New simple heap: #1 004d0000 LB 0x400000 (for 1544192 allocation) 1f58.120c: supR3HardenedEarlyCompact: Removed heap 1 (0x8f0000 LB 0x400000) 1f58.120c: supR3HardNtEnableThreadCreation: 370.6d0: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 370.6d0: System32: \Device\HarddiskVolume2\Windows\System32 370.6d0: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS 370.6d0: KnownDllPath: C:\WINDOWS\system32 370.6d0: supR3HardenedVmProcessInit: Opening vboxdrv... 370.6d0: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 370.6d0: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 370.6d0: Registered Dll notification callback with NTDLL. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=00000801: [calling] 370.6d0: supR3HardenedDllNotificationCallback: load 74820000 LB 0x00177000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0] 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll 370.6d0: supR3HardenedDllNotificationCallback: load 74f40000 LB 0x00095000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\KERNEL32.DLL' 370.6d0: supR3HardenedDllNotificationCallback: load 00ea0000 LB 0x000ff000 C:\Program Files\Oracle\VirtualBox\VirtualBox.exe [fFlags=0x0] 370.6d0: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 370.6d0: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10 1f58.120c: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 237 ms. 370.6d0: \SystemRoot\System32\ntdll.dll: 370.6d0: CreationTime: 2015-07-24T03:23:33.225736800Z 370.6d0: LastWriteTime: 2015-07-24T03:23:33.241361000Z 370.6d0: ChangeTime: 2015-07-24T03:25:49.491626600Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x176c38 370.6d0: NT Headers: 0xf0 370.6d0: Timestamp: 0x55a85cc1 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x55a85cc1 370.6d0: Image Version: 10.0 370.6d0: SizeOfImage: 0x179000 (1544192) 370.6d0: Resource Dir: 0x10e000 LB 0x65720 370.6d0: ProductName: Microsoft® Windows® Operating System 370.6d0: ProductVersion: 10.0.10240.16392 370.6d0: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608) 370.6d0: FileDescription: NT Layer DLL 370.6d0: \SystemRoot\System32\kernel32.dll: 370.6d0: CreationTime: 2015-07-10T08:24:38.139724700Z 370.6d0: LastWriteTime: 2015-07-10T08:24:38.139724700Z 370.6d0: ChangeTime: 2015-07-24T02:59:37.566677800Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x986b8 370.6d0: NT Headers: 0xf8 370.6d0: Timestamp: 0x559f3b86 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x559f3b86 370.6d0: Image Version: 10.0 370.6d0: SizeOfImage: 0x95000 (610304) 370.6d0: Resource Dir: 0x8f000 LB 0x518 370.6d0: ProductName: Microsoft® Windows® Operating System 370.6d0: ProductVersion: 10.0.10240.16384 370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700) 370.6d0: FileDescription: Windows NT BASE API Client DLL 370.6d0: \SystemRoot\System32\KernelBase.dll: 370.6d0: CreationTime: 2015-07-10T08:24:56.031660300Z 370.6d0: LastWriteTime: 2015-07-10T08:24:56.047288800Z 370.6d0: ChangeTime: 2015-07-24T02:59:37.707301500Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x175610 370.6d0: NT Headers: 0xf0 370.6d0: Timestamp: 0x559f3b4c 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x559f3b4c 370.6d0: Image Version: 10.0 370.6d0: SizeOfImage: 0x177000 (1536000) 370.6d0: Resource Dir: 0x15b000 LB 0x530 370.6d0: ProductName: Microsoft® Windows® Operating System 370.6d0: ProductVersion: 10.0.10240.16384 370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700) 370.6d0: FileDescription: Windows NT BASE API Client DLL 370.6d0: \SystemRoot\System32\apisetschema.dll: 370.6d0: CreationTime: 2015-07-10T08:24:49.281165400Z 370.6d0: LastWriteTime: 2015-07-10T08:24:49.281165400Z 370.6d0: ChangeTime: 2015-07-24T02:59:29.910411200Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x16560 370.6d0: NT Headers: 0xc8 370.6d0: Timestamp: 0x559f4063 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x559f4063 370.6d0: Image Version: 10.0 370.6d0: SizeOfImage: 0x17000 (94208) 370.6d0: Resource Dir: 0x16000 LB 0x3f0 370.6d0: ProductName: Microsoft® Windows® Operating System 370.6d0: ProductVersion: 10.0.10240.16384 370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700) 370.6d0: FileDescription: ApiSet Schema DLL 370.6d0: NtOpenDirectoryObject failed on \Driver: 0xc0000022 370.6d0: supR3HardenedWinFindAdversaries: 0x80 370.6d0: \SystemRoot\System32\drivers\MBAMSwissArmy.sys: 370.6d0: CreationTime: 2015-07-29T17:54:56.857320100Z 370.6d0: LastWriteTime: 2015-07-29T17:57:10.621467300Z 370.6d0: ChangeTime: 2015-07-29T17:57:10.621467300Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x180d8 370.6d0: NT Headers: 0xe0 370.6d0: Timestamp: 0x552c18fe 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x552c18fe 370.6d0: Image Version: 6.1 370.6d0: SizeOfImage: 0x1c000 (114688) 370.6d0: Resource Dir: 0x1a000 LB 0x3f0 370.6d0: ProductName: Malwarebytes Anti-Malware 370.6d0: ProductVersion: 0.2.22.0 370.6d0: FileVersion: 0.2.22.0 370.6d0: FileDescription: Malwarebytes Anti-Malware 370.6d0: \SystemRoot\System32\drivers\mwac.sys: 370.6d0: CreationTime: 2015-07-29T17:54:25.761614300Z 370.6d0: LastWriteTime: 2015-06-18T15:41:58.000000000Z 370.6d0: ChangeTime: 2015-07-29T17:54:25.822618100Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0xcad8 370.6d0: NT Headers: 0xe8 370.6d0: Timestamp: 0x53a0f437 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x53a0f437 370.6d0: Image Version: 6.2 370.6d0: SizeOfImage: 0xf000 (61440) 370.6d0: Resource Dir: 0xd000 LB 0x3e0 370.6d0: ProductName: Malwarebytes Web Access Control 370.6d0: ProductVersion: 1.0.6.0 370.6d0: FileVersion: 1.0.6.0 370.6d0: FileDescription: Malwarebytes Web Access Control 370.6d0: \SystemRoot\System32\drivers\mbamchameleon.sys: 370.6d0: CreationTime: 2015-07-29T17:54:25.826617800Z 370.6d0: LastWriteTime: 2015-06-18T15:41:42.000000000Z 370.6d0: ChangeTime: 2015-07-29T17:54:25.943624500Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x172d8 370.6d0: NT Headers: 0xd0 370.6d0: Timestamp: 0x554cf747 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x554cf747 370.6d0: Image Version: 6.1 370.6d0: SizeOfImage: 0x1b000 (110592) 370.6d0: Resource Dir: 0x18000 LB 0xbd8 370.6d0: ProductName: Malwarebytes Chameleon 370.6d0: ProductVersion: 1.1.20.0 370.6d0: FileVersion: 1.1.20.0 370.6d0: FileDescription: Malwarebytes Chameleon Protection Driver 370.6d0: \SystemRoot\System32\drivers\mbam.sys: 370.6d0: CreationTime: 2015-07-29T17:54:25.702610600Z 370.6d0: LastWriteTime: 2015-06-18T15:41:36.000000000Z 370.6d0: ChangeTime: 2015-07-29T17:54:25.758613500Z 370.6d0: FileAttributes: 0x20 370.6d0: Size: 0x5ad8 370.6d0: NT Headers: 0xd8 370.6d0: Timestamp: 0x540754db 370.6d0: Machine: 0x14c - i386 370.6d0: Timestamp: 0x540754db 370.6d0: Image Version: 6.1 370.6d0: SizeOfImage: 0x9000 (36864) 370.6d0: Resource Dir: 0x7000 LB 0x3d0 370.6d0: ProductName: Malwarebytes Anti-Malware 370.6d0: ProductVersion: 0.1.15.0 370.6d0: FileVersion: 0.1.15.0 370.6d0: FileDescription: Malwarebytes Anti-Malware 370.6d0: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 370.6d0: Calling main() 370.6d0: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 370.6d0: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 370.6d0: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 370.6d0: SUPR3HardenedMain: Final process, opening VBoxDrv... 370.6d0: supR3HardenedEarlyCompact: Removed heap 1 (0x4d0000 LB 0x400000) 370.6d0: supR3HardNtEnableThreadCreation: 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801: [calling] 370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 6c770000 LB 0x00005000 C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'msasn1.dll'. 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'crypt32.dll'. 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #24 'rpcrt4.dll'. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\wintrust.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\wintrust.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume2\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\rpcrt4.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\rpcrt4.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume2\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #27 'msasn1.dll'. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\crypt32.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\crypt32.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume2\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008] 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\msasn1.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\msasn1.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume2\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\msvcrt.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\msvcrt.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume2\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msasn1.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume2\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\Wintrust.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801: [calling] 370.6d0: supR3HardenedDllNotificationCallback: load 75000000 LB 0x000be000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 742d0000 LB 0x0000e000 C:\WINDOWS\system32\MSASN1.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msasn1.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 749a0000 LB 0x00175000 C:\WINDOWS\system32\CRYPT32.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 75550000 LB 0x000c2000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 742f0000 LB 0x00042000 C:\WINDOWS\system32\Wintrust.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\WINDOWS\system32\Wintrust.dll' 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\bcrypt.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\bcrypt.dll 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcrypt.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801: [calling] 370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 741d0000 LB 0x0001d000 C:\WINDOWS\system32\bcrypt.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=741d0000 'C:\WINDOWS\system32\bcrypt.dll' 370.6d0: bcrypt.dll loaded at 741d0000, BCryptOpenAlgorithmProvider at 741d5cc0, preloading providers: 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcryptprimitives.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 740f0000 LB 0x00059000 C:\WINDOWS\system32\bcryptprimitives.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=740f0000 'C:\WINDOWS\system32\bcryptprimitives.dll' 370.6d0: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=00a98ab8) 370.6d0: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=00a98ff8) 370.6d0: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=00a992b0) 370.6d0: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=00a99568) 370.6d0: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=00a99820) 370.6d0: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=00a99ad8) 370.6d0: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=00a99d90) 370.6d0: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=00a9a7d0) 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcrypt.dll'. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\cryptsp.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\cryptsp.dll 370.6d0: supR3HardenedDllNotificationCallback: load 73c40000 LB 0x00013000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\cryptsp.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #16 'bcrypt.dll'. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\rsaenh.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\rsaenh.dll 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedDllNotificationCallback: load 73910000 LB 0x0002f000 C:\WINDOWS\system32\rsaenh.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=73910000 'C:\WINDOWS\system32\rsaenh.dll' 370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcryptprimitives.dll'. 370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\cryptbase.dll) 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\cryptbase.dll 370.6d0: supR3HardenedDllNotificationCallback: load 73d70000 LB 0x0000a000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll [fFlags=0x0] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\cryptbase.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcryptprimitives.dll'... 370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcryptprimitives.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll' [rcNtRedir=0xc0150008] 370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\kernel32.dll' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL' 370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\CRYPT32.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=00000001: [calling] 370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=749a0000 'C:\WINDOWS\system32\CRYPT32.dll' 370.6d0: supR3HardenedDllNotificationCallback: load 74fe0000 LB 0x00019000 C:\WINDOWS\system32\imagehlp.dll [fFlags=0x0] 370.6d0: supHardenedWinVerifyImageByHandle: -> -626 (\Device\HarddiskVolume2\Windows\System32\imagehlp.dll) 370.6d0: Error (rc=0): 370.6d0: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -626 (0xfffffd8e) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume2\Windows\System32\imagehlp.dll: 370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\imagehlp.dll 370.6d0: Fatal error: 370.6d0: supR3HardenedDllNotificationCallback: supR3HardenedScreenImage failed on 'C:\WINDOWS\system32\imagehlp.dll' / '\??\C:\WINDOWS\system32\imagehlp.dll': 0xc0000190 1f58.120c: supR3HardNtChildWaitFor[2]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 266 ms, the end); 8a8.12d4: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 1164 ms, the end);