2a70.145c: Log file opened: 5.2.16r123759 g_hStartupLog=000000000000005c g_uNtVerCombined=0xa0383900 2a70.145c: \SystemRoot\System32\ntdll.dll: 2a70.145c: CreationTime: 2017-03-03T15:46:36.595069000Z 2a70.145c: LastWriteTime: 2017-03-03T15:46:36.605080100Z 2a70.145c: ChangeTime: 2018-06-14T13:57:04.148238000Z 2a70.145c: FileAttributes: 0x20 2a70.145c: Size: 0x1cc888 2a70.145c: NT Headers: 0xd8 2a70.145c: Timestamp: 0x5825887f 2a70.145c: Machine: 0x8664 - amd64 2a70.145c: Timestamp: 0x5825887f 2a70.145c: Image Version: 10.0 2a70.145c: SizeOfImage: 0x1d1000 (1904640) 2a70.145c: Resource Dir: 0x168000 LB 0x67988 2a70.145c: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 2a70.145c: [Raw version resource data: 0x1680f0 LB 0x388, codepage 0x0 (reserved 0x0)] 2a70.145c: ProductName: Microsoft® Windows® Operating System 2a70.145c: ProductVersion: 10.0.14393.479 2a70.145c: FileVersion: 10.0.14393.479 (rs1_release.161110-2025) 2a70.145c: FileDescription: NT Layer DLL 2a70.145c: \SystemRoot\System32\kernel32.dll: 2a70.145c: CreationTime: 2016-07-16T11:42:16.155721400Z 2a70.145c: LastWriteTime: 2016-07-16T11:42:16.155721400Z 2a70.145c: ChangeTime: 2018-06-14T15:03:07.809288800Z 2a70.145c: FileAttributes: 0x20 2a70.145c: Size: 0xaade8 2a70.145c: NT Headers: 0xf0 2a70.145c: Timestamp: 0x57899a29 2a70.145c: Machine: 0x8664 - amd64 2a70.145c: Timestamp: 0x57899a29 2a70.145c: Image Version: 10.0 2a70.145c: SizeOfImage: 0xab000 (700416) 2a70.145c: Resource Dir: 0xa9000 LB 0x528 2a70.145c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2a70.145c: [Raw version resource data: 0xa90b0 LB 0x3ac, codepage 0x0 (reserved 0x0)] 2a70.145c: ProductName: Microsoft® Windows® Operating System 2a70.145c: ProductVersion: 10.0.14393.0 2a70.145c: FileVersion: 10.0.14393.0 (rs1_release.160715-1616) 2a70.145c: FileDescription: Windows NT BASE API Client DLL 2a70.145c: \SystemRoot\System32\KernelBase.dll: 2a70.145c: CreationTime: 2017-03-03T15:46:36.548069100Z 2a70.145c: LastWriteTime: 2017-03-03T15:46:36.562088600Z 2a70.145c: ChangeTime: 2018-06-14T15:03:07.873839300Z 2a70.145c: FileAttributes: 0x20 2a70.145c: Size: 0x21c780 2a70.145c: NT Headers: 0xf8 2a70.145c: Timestamp: 0x582588e6 2a70.145c: Machine: 0x8664 - amd64 2a70.145c: Timestamp: 0x582588e6 2a70.145c: Image Version: 10.0 2a70.145c: SizeOfImage: 0x21d000 (2215936) 2a70.145c: Resource Dir: 0x201000 LB 0x550 2a70.145c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2a70.145c: [Raw version resource data: 0x2010b0 LB 0x3c4, codepage 0x0 (reserved 0x0)] 2a70.145c: ProductName: Microsoft® Windows® Operating System 2a70.145c: ProductVersion: 10.0.14393.479 2a70.145c: FileVersion: 10.0.14393.479 (rs1_release.161110-2025) 2a70.145c: FileDescription: Windows NT BASE API Client DLL 2a70.145c: \SystemRoot\System32\apisetschema.dll: 2a70.145c: CreationTime: 2016-07-16T11:42:21.577586000Z 2a70.145c: LastWriteTime: 2016-07-16T11:42:21.577586000Z 2a70.145c: ChangeTime: 2018-06-14T13:55:56.048267100Z 2a70.145c: FileAttributes: 0x20 2a70.145c: Size: 0x18960 2a70.145c: NT Headers: 0xc8 2a70.145c: Timestamp: 0x57899bd2 2a70.145c: Machine: 0x8664 - amd64 2a70.145c: Timestamp: 0x57899bd2 2a70.145c: Image Version: 10.0 2a70.145c: SizeOfImage: 0x19000 (102400) 2a70.145c: Resource Dir: 0x18000 LB 0x400 2a70.145c: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2a70.145c: [Raw version resource data: 0x18060 LB 0x3a0, codepage 0x0 (reserved 0x0)] 2a70.145c: ProductName: Microsoft® Windows® Operating System 2a70.145c: ProductVersion: 10.0.14393.0 2a70.145c: FileVersion: 10.0.14393.0 (rs1_release.160715-1616) 2a70.145c: FileDescription: ApiSet Schema DLL 2a70.145c: supR3HardenedWinFindAdversaries: 0x8000 2a70.145c: \SystemRoot\System32\drivers\cyprotectdrv64.sys: 2a70.145c: CreationTime: 2018-06-14T14:12:13.038835500Z 2a70.145c: LastWriteTime: 2018-07-09T20:37:12.210928000Z 2a70.145c: ChangeTime: 2018-07-26T19:10:06.937324700Z 2a70.145c: FileAttributes: 0x20 2a70.145c: Size: 0x32228 2a70.145c: NT Headers: 0x100 2a70.145c: Timestamp: 0x5b15ccf2 2a70.145c: Machine: 0x8664 - amd64 2a70.145c: Timestamp: 0x5b15ccf2 2a70.145c: Image Version: 6.1 2a70.145c: SizeOfImage: 0x132000 (1253376) 2a70.145c: Resource Dir: 0x130000 LB 0x2f0 2a70.145c: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2a70.145c: [Raw version resource data: 0x130060 LB 0x28c, codepage 0x0 (reserved 0x0)] 2a70.145c: ProductName: CylancePROTECT 2a70.145c: ProductVersion: 2.0.1490.25 2a70.145c: FileVersion: 2.0.1490.25 2a70.145c: FileDescription: Cylance Protect Driver 2a70.145c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox' 2a70.145c: Calling main() 2a70.145c: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 2a70.145c: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox' 2a70.145c: SUPR3HardenedMain: Respawn #1 2a70.145c: System32: \Device\HarddiskVolume3\Windows\System32 2a70.145c: WinSxS: \Device\HarddiskVolume3\Windows\WinSxS 2a70.145c: KnownDllPath: C:\WINDOWS\System32 2a70.145c: '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 2a70.145c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe) 2a70.145c: supR3HardNtEnableThreadCreation: 2a70.145c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffb79209fa0 pvNtTerminateThread=00007ffb79236b20 2a70.145c: supR3HardenedWinDoReSpawn(1): New child 4158.42c4 [kernel32]. 2a70.145c: supR3HardNtChildGatherData: PebBaseAddress=0000000000d76000 cbPeb=0x388 2a70.145c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ffb79190000 uNtDllChildAddr=00007ffb79190000 2a70.145c: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ffb79209fa0 2a70.145c: supR3HardenedWinSetupChildInit: Start child. 2a70.145c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 2a70.145c: supR3HardNtChildPurify: Startup delay kludge #1/0: 520 ms, 49 sleeps 2a70.145c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 2a70.145c: *0000000000000000-0000000000a5ffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000a60000-0000000000a7ffff 0x0004/0x0004 0x0020000 2a70.145c: *0000000000a80000-0000000000a95fff 0x0002/0x0002 0x0040000 2a70.145c: 0000000000a96000-0000000000a9ffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000aa0000-0000000000b9afff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000b9b000-0000000000b9dfff 0x0104/0x0004 0x0020000 2a70.145c: 0000000000b9e000-0000000000b9ffff 0x0004/0x0004 0x0020000 2a70.145c: *0000000000ba0000-0000000000ba3fff 0x0002/0x0002 0x0040000 2a70.145c: 0000000000ba4000-0000000000baffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000bb0000-0000000000bb1fff 0x0004/0x0004 0x0020000 2a70.145c: 0000000000bb2000-0000000000bbffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000bc0000-0000000000bc0fff 0x0020/0x0020 0x0020000 !! 2a70.145c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000bc0000 (LB 0x1000, 0000000000bc0000 LB 0x1000) 2a70.145c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000bc0000/0000000000bc0000 LB 0/0x1000] 2a70.145c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000bc0000 LB 0x40000 s=0x10000 ap=0x0 rp=0x00000000000001 2a70.145c: 0000000000bc1000-0000000000bfffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000c00000-0000000000d75fff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000d76000-0000000000d78fff 0x0004/0x0004 0x0020000 2a70.145c: 0000000000d79000-0000000000dfffff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000e00000-000000007ffdffff 0x0001/0x0000 0x0000000 2a70.145c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 2a70.145c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 2a70.145c: 000000007fff0000-00007ff66d2fffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ff66d300000-00007ff66d322fff 0x0002/0x0002 0x0040000 2a70.145c: 00007ff66d323000-00007ff66d46ffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ff66d470000-00007ff66d470fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d471000-00007ff66d4e1fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d4e2000-00007ff66d4e2fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d4e3000-00007ff66d528fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d529000-00007ff66d529fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d52a000-00007ff66d52afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d52b000-00007ff66d52ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d530000-00007ff66d530fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d531000-00007ff66d531fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d532000-00007ff66d535fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d536000-00007ff66d57dfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d57e000-00007ffb7918ffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ffb79190000-00007ffb79190fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79191000-00007ffb79297fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79298000-00007ffb792dbfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792dc000-00007ffb792e4fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792e5000-00007ffb792f2fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f3000-00007ffb792f3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f4000-00007ffb792f6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f7000-00007ffb79360fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79361000-00007ffffffdffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 2a70.145c: VirtualBox.exe: timestamp 0x5b4cb14e (rc=VINF_SUCCESS) 2a70.145c: '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 2a70.145c: '\Device\HarddiskVolume3\Windows\System32\ntdll.dll' has no imports 2a70.145c: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x8000 2a70.145c: supR3HardNtChildPurify: Startup delay kludge #1/1: 527 ms, 35 sleeps 2a70.145c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 2a70.145c: *0000000000000000-0000000000a5ffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000a60000-0000000000a7ffff 0x0004/0x0004 0x0020000 2a70.145c: *0000000000a80000-0000000000a95fff 0x0002/0x0002 0x0040000 2a70.145c: 0000000000a96000-0000000000a9ffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000aa0000-0000000000b9afff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000b9b000-0000000000b9dfff 0x0104/0x0004 0x0020000 2a70.145c: 0000000000b9e000-0000000000b9ffff 0x0004/0x0004 0x0020000 2a70.145c: *0000000000ba0000-0000000000ba3fff 0x0002/0x0002 0x0040000 2a70.145c: 0000000000ba4000-0000000000baffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000bb0000-0000000000bb1fff 0x0004/0x0004 0x0020000 2a70.145c: 0000000000bb2000-0000000000bfffff 0x0001/0x0000 0x0000000 2a70.145c: *0000000000c00000-0000000000d75fff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000d76000-0000000000d78fff 0x0004/0x0004 0x0020000 2a70.145c: 0000000000d79000-0000000000dfffff 0x0000/0x0004 0x0020000 2a70.145c: 0000000000e00000-000000007ffdffff 0x0001/0x0000 0x0000000 2a70.145c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 2a70.145c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 2a70.145c: 000000007fff0000-00007ff66d2fffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ff66d300000-00007ff66d322fff 0x0002/0x0002 0x0040000 2a70.145c: 00007ff66d323000-00007ff66d46ffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ff66d470000-00007ff66d470fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d471000-00007ff66d4e1fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d4e2000-00007ff66d4e2fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d4e3000-00007ff66d528fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d529000-00007ff66d535fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d536000-00007ff66d57dfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBox.exe 2a70.145c: 00007ff66d57e000-00007ffb7918ffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ffb79190000-00007ffb79190fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79191000-00007ffb79297fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79298000-00007ffb792dbfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792dc000-00007ffb792dffff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792e0000-00007ffb792e4fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792e5000-00007ffb792f2fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f3000-00007ffb792f3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f4000-00007ffb792f6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb792f7000-00007ffb79360fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2a70.145c: 00007ffb79361000-00007ffffffdffff 0x0001/0x0000 0x0000000 2a70.145c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 2a70.145c: supR3HardNtChildPurify: Done after 1697 ms and 1 fixes (loop #1). 4158.42c4: Log file opened: 5.2.16r123759 g_hStartupLog=0000000000000004 g_uNtVerCombined=0xa0383900 4158.42c4: supR3HardenedVmProcessInit: uNtDllAddr=00007ffb79190000 g_uNtVerCombined=0xa0383900 4158.42c4: ntdll.dll: timestamp 0x5825887f (rc=VINF_SUCCESS) 4158.42c4: New simple heap: #1 0000000000f00000 LB 0x400000 (for 1904640 allocation) 2a70.145c: supR3HardNtEnableThreadCreation: 4158.42c4: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox' 4158.42c4: System32: \Device\HarddiskVolume3\Windows\System32 4158.42c4: WinSxS: \Device\HarddiskVolume3\Windows\WinSxS 4158.42c4: KnownDllPath: C:\WINDOWS\System32 4158.42c4: supR3HardenedVmProcessInit: Opening vboxdrv stub... 4158.42c4: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 4158.42c4: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 4158.42c4: Registered Dll notification callback with NTDLL. 4158.42c4: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume3\Windows\System32\kernel32.dll) 4158.42c4: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume3\Windows\System32\kernel32.dll 4158.42c4: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\System32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000004001: [calling] 2a70.145c: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 64 ms, CloseEvents);