2900.2844: Log file opened: 6.0.2r128162 g_hStartupLog=00000000000001a0 g_uNtVerCombined=0xa0456300 2900.2844: \SystemRoot\System32\ntdll.dll: 2900.2844: CreationTime: 2018-12-11T19:58:43.599431300Z 2900.2844: LastWriteTime: 2018-12-11T19:58:43.661909900Z 2900.2844: ChangeTime: 2019-01-08T20:05:18.458978600Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x1e7010 2900.2844: NT Headers: 0xe0 2900.2844: Timestamp: 0xe8b54827 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0xe8b54827 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x1ed000 (2019328) 2900.2844: Resource Dir: 0x17d000 LB 0x6ea08 2900.2844: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x17d0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Microsoft® Windows® Operating System 2900.2844: ProductVersion: 10.0.17763.194 2900.2844: FileVersion: 10.0.17763.194 (WinBuild.160101.0800) 2900.2844: FileDescription: NT Layer DLL 2900.2844: \SystemRoot\System32\kernel32.dll: 2900.2844: CreationTime: 2018-09-15T07:28:44.342269900Z 2900.2844: LastWriteTime: 2018-09-15T07:28:44.342269900Z 2900.2844: ChangeTime: 2018-10-03T09:01:08.913176700Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0xb1380 2900.2844: NT Headers: 0xe8 2900.2844: Timestamp: 0x65614da1 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x65614da1 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0xb3000 (733184) 2900.2844: Resource Dir: 0xb1000 LB 0x520 2900.2844: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0xb10b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Microsoft® Windows® Operating System 2900.2844: ProductVersion: 10.0.17763.1 2900.2844: FileVersion: 10.0.17763.1 (WinBuild.160101.0800) 2900.2844: FileDescription: Windows NT BASE API Client DLL 2900.2844: \SystemRoot\System32\KernelBase.dll: 2900.2844: CreationTime: 2018-11-16T17:22:47.778604200Z 2900.2844: LastWriteTime: 2018-11-16T17:22:47.834576100Z 2900.2844: ChangeTime: 2019-01-08T20:05:18.458978600Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x293cc8 2900.2844: NT Headers: 0xf8 2900.2844: Timestamp: 0x1659a33b 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x1659a33b 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x293000 (2699264) 2900.2844: Resource Dir: 0x26f000 LB 0x548 2900.2844: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x26f0b0 LB 0x3bc, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Microsoft® Windows® Operating System 2900.2844: ProductVersion: 10.0.17763.134 2900.2844: FileVersion: 10.0.17763.134 (WinBuild.160101.0800) 2900.2844: FileDescription: Windows NT BASE API Client DLL 2900.2844: \SystemRoot\System32\apisetschema.dll: 2900.2844: CreationTime: 2018-09-15T07:28:25.403122600Z 2900.2844: LastWriteTime: 2018-09-15T07:28:25.403122600Z 2900.2844: ChangeTime: 2018-10-03T08:40:14.248581600Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x1c738 2900.2844: NT Headers: 0xd0 2900.2844: Timestamp: 0x33775897 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x33775897 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x1d000 (118784) 2900.2844: Resource Dir: 0x1c000 LB 0x408 2900.2844: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x1c060 LB 0x3a8, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Microsoft® Windows® Operating System 2900.2844: ProductVersion: 10.0.17763.1 2900.2844: FileVersion: 10.0.17763.1 (WinBuild.160101.0800) 2900.2844: FileDescription: ApiSet Schema DLL 2900.2844: NtOpenDirectoryObject failed on \Driver: 0xc0000022 2900.2844: supR3HardenedWinFindAdversaries: 0x8 2900.2844: \SystemRoot\System32\drivers\tmcomm.sys: 2900.2844: CreationTime: 2018-12-16T01:23:02.163299500Z 2900.2844: LastWriteTime: 2018-09-28T08:00:34.000000000Z 2900.2844: ChangeTime: 2018-12-16T01:23:02.179293100Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x71508 2900.2844: NT Headers: 0xf8 2900.2844: Timestamp: 0x5bab849c 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x5bab849c 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x74000 (475136) 2900.2844: Resource Dir: 0x72000 LB 0x568 2900.2844: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x72060 LB 0x508, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Trend Micro Eyes 2900.2844: ProductVersion: 8.10 2900.2844: FileVersion: 8.10.0.1052 2900.2844: SpecialBuild: 1052 2900.2844: PrivateBuild: Build 1052 - 9/26/2018 2900.2844: FileDescription: TrendMicro Common Module 2900.2844: \SystemRoot\System32\drivers\tmactmon.sys: 2900.2844: CreationTime: 2018-12-16T01:23:02.161289700Z 2900.2844: LastWriteTime: 2018-09-28T08:00:34.000000000Z 2900.2844: ChangeTime: 2018-12-16T01:23:02.190273900Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x24100 2900.2844: NT Headers: 0xf0 2900.2844: Timestamp: 0x5bab84ba 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x5bab84ba 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x2a000 (172032) 2900.2844: Resource Dir: 0x28000 LB 0x588 2900.2844: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x28060 LB 0x524, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Trend Micro Eyes 2900.2844: ProductVersion: 8.10 2900.2844: FileVersion: 8.10.0.1052 2900.2844: SpecialBuild: 1052 2900.2844: PrivateBuild: Build 1052 - 9/26/2018 2900.2844: FileDescription: TrendMicro Activity Monitor Module 2900.2844: \SystemRoot\System32\drivers\tmevtmgr.sys: 2900.2844: CreationTime: 2018-12-16T01:23:02.164288600Z 2900.2844: LastWriteTime: 2018-09-28T08:00:34.000000000Z 2900.2844: ChangeTime: 2018-12-16T01:23:02.184277700Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x24500 2900.2844: NT Headers: 0xf8 2900.2844: Timestamp: 0x5bab84ae 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x5bab84ae 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x28000 (163840) 2900.2844: Resource Dir: 0x26000 LB 0x588 2900.2844: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x26060 LB 0x524, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Trend Micro Eyes 2900.2844: ProductVersion: 8.10 2900.2844: FileVersion: 8.10.0.1052 2900.2844: SpecialBuild: 1052 2900.2844: PrivateBuild: Build 1052 - 9/26/2018 2900.2844: FileDescription: TrendMicro Event Management Module 2900.2844: \SystemRoot\System32\drivers\tmebc64.sys: 2900.2844: CreationTime: 2018-12-16T01:23:01.999998800Z 2900.2844: LastWriteTime: 2016-01-05T03:35:34.000000000Z 2900.2844: ChangeTime: 2018-12-16T01:23:02.106313100Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x11b38 2900.2844: NT Headers: 0xf8 2900.2844: Timestamp: 0x564ac673 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x564ac673 2900.2844: Image Version: 6.0 2900.2844: SizeOfImage: 0x12000 (73728) 2900.2844: Resource Dir: 0x10000 LB 0x6f8 2900.2844: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x10060 LB 0x694, codepage 0x0 (reserved 0x0)] 2900.2844: ProductName: Trend Micro Early Boot Clean 2900.2844: ProductVersion: 1.5 2900.2844: FileVersion: 1.5.0.1023 2900.2844: SpecialBuild: 1023 2900.2844: PrivateBuild: Build 1023 - 11/17/2015 2900.2844: FileDescription: Trend Micro early boot driver 2900.2844: \SystemRoot\System32\drivers\tmeevw.sys: 2900.2844: CreationTime: 2018-12-16T01:23:02.228252500Z 2900.2844: LastWriteTime: 2017-05-10T07:46:18.000000000Z 2900.2844: ChangeTime: 2018-12-16T01:23:02.233249900Z 2900.2844: FileAttributes: 0x20 2900.2844: Size: 0x240d8 2900.2844: NT Headers: 0xf8 2900.2844: Timestamp: 0x58f47f34 2900.2844: Machine: 0x8664 - amd64 2900.2844: Timestamp: 0x58f47f34 2900.2844: Image Version: 10.0 2900.2844: SizeOfImage: 0x25000 (151552) 2900.2844: Resource Dir: 0x1e000 LB 0x51a8 2900.2844: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2900.2844: [Raw version resource data: 0x22cac LB 0x4fc, codepage 0x4e4 (reserved 0x0)] 2900.2844: ProductName: Trend Micro EagleEye 3.5 2900.2844: ProductVersion: 3.5 2900.2844: FileVersion: 3.5.0.1004 2900.2844: SpecialBuild: 1004 2900.2844: PrivateBuild: Build 1004 - 4/17/2017 2900.2844: FileDescription: Trend Micro EagleEye Driver (VW) (amd64-fre) 2900.2844: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox' 2900.2844: Calling main() 2900.2844: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2 2900.2844: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox' 2900.2844: SUPR3HardenedMain: Respawn #1 2900.2844: System32: \Device\HarddiskVolume3\Windows\System32 2900.2844: WinSxS: \Device\HarddiskVolume3\Windows\WinSxS 2900.2844: KnownDllPath: C:\WINDOWS\System32 2900.2844: '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 2900.2844: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe) 2900.2844: supR3HardNtEnableThreadCreation: 2900.2844: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ff849675640 pvNtTerminateThread=00007ff8496a00b0 2900.2844: supR3HardenedWinDoReSpawn(1): New child 910.2f64 [kernel32]. 2900.2844: supR3HardNtChildGatherData: PebBaseAddress=00000000008ba000 cbPeb=0x388 2900.2844: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ff849600000 uNtDllChildAddr=00007ff849600000 2900.2844: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ff849675640 2900.2844: supR3HardenedWinSetupChildInit: Start child. 2900.2844: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 2900.2844: supR3HardNtChildPurify: Startup delay kludge #1/0: 519 ms, 63 sleeps 2900.2844: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 2900.2844: *0000000000000000-000000000068ffff 0x0001/0x0000 0x0000000 2900.2844: *0000000000690000-00000000006affff 0x0004/0x0004 0x0020000 2900.2844: *00000000006b0000-00000000006c9fff 0x0002/0x0002 0x0040000 2900.2844: 00000000006ca000-00000000006cffff 0x0001/0x0000 0x0000000 2900.2844: *00000000006d0000-00000000007cafff 0x0000/0x0004 0x0020000 2900.2844: 00000000007cb000-00000000007cdfff 0x0104/0x0004 0x0020000 2900.2844: 00000000007ce000-00000000007cffff 0x0004/0x0004 0x0020000 2900.2844: *00000000007d0000-00000000007d0fff 0x0040/0x0004 0x0020000 !! 2900.2844: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 00000000007d0000 (LB 0x1000, 00000000007d0000 LB 0x1000) 2900.2844: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [00000000007d0000/00000000007d0000 LB 0/0x1000] 2900.2844: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/00000000007d0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 2900.2844: 00000000007d1000-00000000007dffff 0x0001/0x0000 0x0000000 2900.2844: *00000000007e0000-00000000007e3fff 0x0002/0x0002 0x0040000 2900.2844: 00000000007e4000-00000000007effff 0x0001/0x0000 0x0000000 2900.2844: *00000000007f0000-00000000007f1fff 0x0004/0x0004 0x0020000 2900.2844: 00000000007f2000-00000000007fffff 0x0001/0x0000 0x0000000 2900.2844: *0000000000800000-00000000008b9fff 0x0000/0x0004 0x0020000 2900.2844: 00000000008ba000-00000000008bcfff 0x0004/0x0004 0x0020000 2900.2844: 00000000008bd000-00000000009fffff 0x0000/0x0004 0x0020000 2900.2844: 0000000000a00000-000000007ffdffff 0x0001/0x0000 0x0000000 2900.2844: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 2900.2844: 000000007ffe1000-000000007ffe6fff 0x0001/0x0000 0x0000000 2900.2844: *000000007ffe7000-000000007ffe7fff 0x0002/0x0002 0x0020000 2900.2844: 000000007ffe8000-00007ff59bfaffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff59bfb0000-00007ff59bfb0fff 0x0002/0x0002 0x0040000 2900.2844: 00007ff59bfb1000-00007ff59bfbffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff59bfc0000-00007ff59bfe2fff 0x0002/0x0002 0x0040000 2900.2844: 00007ff59bfe3000-00007ff75f0dffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff75f0e0000-00007ff75f0e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f0e1000-00007ff75f153fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f154000-00007ff75f154fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f155000-00007ff75f19bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f19c000-00007ff75f19cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f19d000-00007ff75f19dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f19e000-00007ff75f1a2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1a3000-00007ff75f1a3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1a4000-00007ff75f1a4fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1a5000-00007ff75f1a8fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1a9000-00007ff75f1f1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1f2000-00007ff8495fffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff849600000-00007ff849600fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849601000-00007ff849717fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849718000-00007ff84975efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84975f000-00007ff849769fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84976a000-00007ff849777fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849778000-00007ff849778fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849779000-00007ff84977bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84977c000-00007ff8497ecfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff8497ed000-00007ffffffeffff 0x0001/0x0000 0x0000000 2900.2844: VirtualBoxVM.exe: timestamp 0x5c3ca16b (rc=VINF_SUCCESS) 2900.2844: '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 2900.2844: '\Device\HarddiskVolume3\Windows\System32\ntdll.dll' has no imports 2900.2844: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x8 2900.2844: supR3HardNtChildPurify: Startup delay kludge #1/1: 517 ms, 63 sleeps 2900.2844: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 2900.2844: *0000000000000000-000000000068ffff 0x0001/0x0000 0x0000000 2900.2844: *0000000000690000-00000000006affff 0x0004/0x0004 0x0020000 2900.2844: *00000000006b0000-00000000006c9fff 0x0002/0x0002 0x0040000 2900.2844: 00000000006ca000-00000000006cffff 0x0001/0x0000 0x0000000 2900.2844: *00000000006d0000-00000000007cafff 0x0000/0x0004 0x0020000 2900.2844: 00000000007cb000-00000000007cdfff 0x0104/0x0004 0x0020000 2900.2844: 00000000007ce000-00000000007cffff 0x0004/0x0004 0x0020000 2900.2844: 00000000007d0000-00000000007dffff 0x0001/0x0000 0x0000000 2900.2844: *00000000007e0000-00000000007e3fff 0x0002/0x0002 0x0040000 2900.2844: 00000000007e4000-00000000007effff 0x0001/0x0000 0x0000000 2900.2844: *00000000007f0000-00000000007f1fff 0x0004/0x0004 0x0020000 2900.2844: 00000000007f2000-00000000007fffff 0x0001/0x0000 0x0000000 2900.2844: *0000000000800000-00000000008b9fff 0x0000/0x0004 0x0020000 2900.2844: 00000000008ba000-00000000008bcfff 0x0004/0x0004 0x0020000 2900.2844: 00000000008bd000-00000000009fffff 0x0000/0x0004 0x0020000 2900.2844: 0000000000a00000-000000007ffdffff 0x0001/0x0000 0x0000000 2900.2844: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 2900.2844: 000000007ffe1000-000000007ffe6fff 0x0001/0x0000 0x0000000 2900.2844: *000000007ffe7000-000000007ffe7fff 0x0002/0x0002 0x0020000 2900.2844: 000000007ffe8000-00007ff59bfaffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff59bfb0000-00007ff59bfb0fff 0x0002/0x0002 0x0040000 2900.2844: 00007ff59bfb1000-00007ff59bfbffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff59bfc0000-00007ff59bfe2fff 0x0002/0x0002 0x0040000 2900.2844: 00007ff59bfe3000-00007ff75f0dffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff75f0e0000-00007ff75f0e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f0e1000-00007ff75f153fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f154000-00007ff75f154fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f155000-00007ff75f19bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f19c000-00007ff75f1a8fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1a9000-00007ff75f1f1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: 00007ff75f1f2000-00007ff8495fffff 0x0001/0x0000 0x0000000 2900.2844: *00007ff849600000-00007ff849600fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849601000-00007ff849717fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849718000-00007ff84975efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84975f000-00007ff849762fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849763000-00007ff849769fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84976a000-00007ff849777fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849778000-00007ff849778fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff849779000-00007ff84977bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff84977c000-00007ff8497ecfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 2900.2844: 00007ff8497ed000-00007ffffffeffff 0x0001/0x0000 0x0000000 2900.2844: supR3HardNtChildPurify: Done after 1116 ms and 1 fixes (loop #1). 2900.2844: supR3HardNtEnableThreadCreation: 910.2f64: Log file opened: 6.0.2r128162 g_hStartupLog=0000000000000004 g_uNtVerCombined=0xa0456300 910.2f64: supR3HardenedVmProcessInit: uNtDllAddr=00007ff849600000 g_uNtVerCombined=0xa0456300 910.2f64: ntdll.dll: timestamp 0xe8b54827 (rc=VINF_SUCCESS) 910.2f64: New simple heap: #1 0000000000b00000 LB 0x400000 (for 2019328 allocation) 910.2f64: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox' 910.2f64: System32: \Device\HarddiskVolume3\Windows\System32 910.2f64: WinSxS: \Device\HarddiskVolume3\Windows\WinSxS 910.2f64: KnownDllPath: C:\WINDOWS\System32 910.2f64: supR3HardenedVmProcessInit: Opening vboxdrv stub... 910.2f64: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 910.2f64: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 910.2f64: Registered Dll notification callback with NTDLL. 910.2f64: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume3\Windows\System32\kernel32.dll) 910.2f64: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume3\Windows\System32\kernel32.dll 910.2f64: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\System32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000004001: [calling] 910.2f64: supR3HardenedDllNotificationCallback: load 00007ff846320000 LB 0x00293000 C:\WINDOWS\System32\KERNELBASE.dll [fFlags=0x0] 910.2f64: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume3\Windows\System32\KernelBase.dll) 910.2f64: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume3\Windows\System32\KernelBase.dll 910.2f64: supR3HardenedDllNotificationCallback: load 00007ff848880000 LB 0x000b3000 C:\WINDOWS\System32\KERNEL32.DLL [fFlags=0x0] 910.2f64: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume3\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 910.2f64: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ff848880000 'C:\WINDOWS\System32\KERNEL32.DLL' 910.2f64: supR3HardenedDllNotificationCallback: load 00007ff75f0e0000 LB 0x00112000 D:\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe [fFlags=0x0] 910.2f64: '\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 910.2f64: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe) 910.2f64: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files (x86)\Oracle\VirtualBox\VirtualBoxVM.exe 2900.2844: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 103 ms, CloseEvents);