3394.22a0: Log file opened: 6.0.4r128413 g_hStartupLog=0000000000000068 g_uNtVerCombined=0xa042ee00 3394.22a0: \SystemRoot\System32\ntdll.dll: 3394.22a0: CreationTime: 2019-02-13T17:38:38.308291300Z 3394.22a0: LastWriteTime: 2019-01-09T05:39:12.294139300Z 3394.22a0: ChangeTime: 2019-03-13T07:09:51.374801800Z 3394.22a0: FileAttributes: 0x20 3394.22a0: Size: 0x1da658 3394.22a0: NT Headers: 0xe8 3394.22a0: Timestamp: 0x74bed8b0 3394.22a0: Machine: 0x8664 - amd64 3394.22a0: Timestamp: 0x74bed8b0 3394.22a0: Image Version: 10.0 3394.22a0: SizeOfImage: 0x1e1000 (1970176) 3394.22a0: Resource Dir: 0x174000 LB 0x6b3e8 3394.22a0: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 3394.22a0: [Raw version resource data: 0x1740f0 LB 0x380, codepage 0x0 (reserved 0x0)] 3394.22a0: ProductName: Microsoft® Windows® Operating System 3394.22a0: ProductVersion: 10.0.17134.556 3394.22a0: FileVersion: 10.0.17134.556 (WinBuild.160101.0800) 3394.22a0: FileDescription: NT Layer DLL 3394.22a0: \SystemRoot\System32\kernel32.dll: 3394.22a0: CreationTime: 2019-03-13T07:06:23.564682000Z 3394.22a0: LastWriteTime: 2019-03-06T15:39:47.791712200Z 3394.22a0: ChangeTime: 2019-03-18T07:05:51.042553000Z 3394.22a0: FileAttributes: 0x20 3394.22a0: Size: 0xafe98 3394.22a0: NT Headers: 0xe8 3394.22a0: Timestamp: 0x9fa3d270 3394.22a0: Machine: 0x8664 - amd64 3394.22a0: Timestamp: 0x9fa3d270 3394.22a0: Image Version: 10.0 3394.22a0: SizeOfImage: 0xb2000 (729088) 3394.22a0: Resource Dir: 0xb0000 LB 0x520 3394.22a0: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3394.22a0: [Raw version resource data: 0xb00b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 3394.22a0: ProductName: Microsoft® Windows® Operating System 3394.22a0: ProductVersion: 10.0.17134.648 3394.22a0: FileVersion: 10.0.17134.648 (WinBuild.160101.0800) 3394.22a0: FileDescription: Windows NT BASE API Client DLL 3394.22a0: \SystemRoot\System32\KernelBase.dll: 3394.22a0: CreationTime: 2019-02-13T17:38:31.833983000Z 3394.22a0: LastWriteTime: 2019-01-09T05:39:21.823731200Z 3394.22a0: ChangeTime: 2019-03-13T07:09:51.372324600Z 3394.22a0: FileAttributes: 0x20 3394.22a0: Size: 0x273d70 3394.22a0: NT Headers: 0xf0 3394.22a0: Timestamp: 0xb9f4a0f1 3394.22a0: Machine: 0x8664 - amd64 3394.22a0: Timestamp: 0xb9f4a0f1 3394.22a0: Image Version: 10.0 3394.22a0: SizeOfImage: 0x273000 (2568192) 3394.22a0: Resource Dir: 0x251000 LB 0x548 3394.22a0: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3394.22a0: [Raw version resource data: 0x2510b0 LB 0x3bc, codepage 0x0 (reserved 0x0)] 3394.22a0: ProductName: Microsoft® Windows® Operating System 3394.22a0: ProductVersion: 10.0.17134.556 3394.22a0: FileVersion: 10.0.17134.556 (WinBuild.160101.0800) 3394.22a0: FileDescription: Windows NT BASE API Client DLL 3394.22a0: \SystemRoot\System32\apisetschema.dll: 3394.22a0: CreationTime: 2018-04-11T23:34:44.042150700Z 3394.22a0: LastWriteTime: 2018-04-11T23:34:44.042150700Z 3394.22a0: ChangeTime: 2018-10-17T07:38:42.811265500Z 3394.22a0: FileAttributes: 0x20 3394.22a0: Size: 0x1bd98 3394.22a0: NT Headers: 0xd0 3394.22a0: Timestamp: 0xd02ff418 3394.22a0: Machine: 0x8664 - amd64 3394.22a0: Timestamp: 0xd02ff418 3394.22a0: Image Version: 10.0 3394.22a0: SizeOfImage: 0x1c000 (114688) 3394.22a0: Resource Dir: 0x1b000 LB 0x408 3394.22a0: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3394.22a0: [Raw version resource data: 0x1b060 LB 0x3a8, codepage 0x0 (reserved 0x0)] 3394.22a0: ProductName: Microsoft® Windows® Operating System 3394.22a0: ProductVersion: 10.0.17134.1 3394.22a0: FileVersion: 10.0.17134.1 (WinBuild.160101.0800) 3394.22a0: FileDescription: ApiSet Schema DLL 3394.22a0: NtOpenDirectoryObject failed on \Driver: 0xc0000022 3394.22a0: supR3HardenedWinFindAdversaries: 0x800 3394.22a0: \SystemRoot\System32\drivers\inspect.sys: 3394.22a0: CreationTime: 2018-12-17T07:20:08.000000000Z 3394.22a0: LastWriteTime: 2018-12-17T07:20:08.000000000Z 3394.22a0: ChangeTime: 2019-03-18T13:04:49.868001900Z 3394.22a0: FileAttributes: 0x20 3394.22a0: Size: 0xbfb8 3394.22a0: NT Headers: 0xe0 3394.22a0: Timestamp: 0x5afc38de 3394.22a0: Machine: 0x8664 - amd64 3394.22a0: Timestamp: 0x5afc38de 3394.22a0: Image Version: 10.0 3394.22a0: SizeOfImage: 0xd000 (53248) 3394.22a0: Resource Dir: 0xb000 LB 0x308 3394.22a0: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x419)] 3394.22a0: [Raw version resource data: 0xb060 LB 0x2a4, codepage 0x0 (reserved 0x0)] 3394.22a0: ProductName: SOLAR INSPERCT 3394.22a0: ProductVersion: 1.0.0.11 3394.22a0: FileVersion: 1.0.0.11 3394.22a0: FileDescription: inspect driver 3394.22a0: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox' 3394.22a0: Calling main() 3394.22a0: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2 3394.22a0: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox' 3394.22a0: SUPR3HardenedMain: Respawn #1 3394.22a0: System32: \Device\HarddiskVolume3\Windows\System32 3394.22a0: WinSxS: \Device\HarddiskVolume3\Windows\WinSxS 3394.22a0: KnownDllPath: C:\Windows\System32 3394.22a0: '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 3394.22a0: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 3394.22a0: supR3HardNtEnableThreadCreation: 3394.22a0: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ff83d7b4f90 pvNtTerminateThread=00007ff83d7db3f0 3394.22a0: supR3HardenedWinDoReSpawn(1): New child 2338.2934 [kernel32]. 3394.22a0: supR3HardNtChildGatherData: PebBaseAddress=0000000001122000 cbPeb=0x388 3394.22a0: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ff83d740000 uNtDllChildAddr=00007ff83d740000 3394.22a0: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ff83d7b4f90 3394.22a0: supR3HardenedWinSetupChildInit: Start child. 3394.22a0: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 3394.22a0: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 60 sleeps 3394.22a0: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 3394.22a0: *0000000000000000-0000000000fbffff 0x0001/0x0000 0x0000000 3394.22a0: *0000000000fc0000-0000000000fdffff 0x0004/0x0004 0x0020000 3394.22a0: *0000000000fe0000-0000000000ff8fff 0x0002/0x0002 0x0040000 3394.22a0: 0000000000ff9000-0000000000ffffff 0x0001/0x0000 0x0000000 3394.22a0: *0000000001000000-0000000001121fff 0x0000/0x0004 0x0020000 3394.22a0: 0000000001122000-0000000001126fff 0x0004/0x0004 0x0020000 3394.22a0: 0000000001127000-00000000011fffff 0x0000/0x0004 0x0020000 3394.22a0: *0000000001200000-00000000012fafff 0x0000/0x0004 0x0020000 3394.22a0: 00000000012fb000-00000000012fdfff 0x0104/0x0004 0x0020000 3394.22a0: 00000000012fe000-00000000012fffff 0x0004/0x0004 0x0020000 3394.22a0: *0000000001300000-0000000001300fff 0x0040/0x0040 0x0020000 !! 3394.22a0: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000001300000 (LB 0x1000, 0000000001300000 LB 0x1000) 3394.22a0: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000001300000/0000000001300000 LB 0/0x1000] 3394.22a0: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000001300000 LB 0x10000 s=0x10000 ap=0x0 rp=0x42342d4600000001 3394.22a0: 0000000001301000-000000000130ffff 0x0001/0x0000 0x0000000 3394.22a0: *0000000001310000-0000000001317fff 0x0000/0x0004 0x0020000 3394.22a0: 0000000001318000-000000000131afff 0x0104/0x0004 0x0020000 3394.22a0: 000000000131b000-000000000140ffff 0x0004/0x0004 0x0020000 3394.22a0: *0000000001410000-0000000001413fff 0x0002/0x0002 0x0040000 3394.22a0: 0000000001414000-000000000141ffff 0x0001/0x0000 0x0000000 3394.22a0: *0000000001420000-0000000001420fff 0x0004/0x0004 0x0020000 3394.22a0: 0000000001421000-000000000142ffff 0x0001/0x0000 0x0000000 3394.22a0: *0000000001430000-0000000001430fff 0x0004/0x0004 0x0020000 3394.22a0: 0000000001431000-000000007ffdffff 0x0001/0x0000 0x0000000 3394.22a0: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 3394.22a0: 000000007ffe1000-00007ff5ba77ffff 0x0001/0x0000 0x0000000 3394.22a0: *00007ff5ba780000-00007ff5ba7a2fff 0x0002/0x0002 0x0040000 3394.22a0: 00007ff5ba7a3000-00007ff79fe7ffff 0x0001/0x0000 0x0000000 3394.22a0: *00007ff79fe80000-00007ff79fe80fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79fe81000-00007ff79fef3fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79fef4000-00007ff79fef4fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79fef5000-00007ff79ff3bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff3c000-00007ff79ff3cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff3d000-00007ff79ff3dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff3e000-00007ff79ff42fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff43000-00007ff79ff43fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff44000-00007ff79ff44fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff45000-00007ff79ff48fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff49000-00007ff79ff91fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 3394.22a0: 00007ff79ff92000-00007ff83d73ffff 0x0001/0x0000 0x0000000 3394.22a0: *00007ff83d740000-00007ff83d740fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d741000-00007ff83d84ffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d850000-00007ff83d895fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d896000-00007ff83d89afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d89b000-00007ff83d89cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d89d000-00007ff83d8a0fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d8a1000-00007ff83d8aefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d8af000-00007ff83d8affff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d8b0000-00007ff83d8b2fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d8b3000-00007ff83d920fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume3\Windows\System32\ntdll.dll 3394.22a0: 00007ff83d921000-00007ffffffeffff 0x0001/0x0000 0x0000000 3394.22a0: VirtualBoxVM.exe: timestamp 0x5c4b51f3 (rc=VINF_SUCCESS) 3394.22a0: '\Device\HarddiskVolume3\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 3394.22a0: Error (rc=-5625): 3394.22a0: VirtualBoxVM.exe: Error reading 0x400 bytes at 00007ff79fe80000 (rva 0x0, #0, headers) from memory: 0x8000000d 3394.22a0: Error (rc=-5625): 3394.22a0: supHardenedWinVerifyProcess failed with Unknown Status -5625 (0xffffea07): VirtualBoxVM.exe: Error reading 0x400 bytes at 00007ff79fe80000 (rva 0x0, #0, headers) from memory: 0x8000000d 3394.22a0: Error -5625 in supR3HardNtChildPurify! (enmWhat=5) 3394.22a0: supHardenedWinVerifyProcess failed with Unknown Status -5625 (0xffffea07): VirtualBoxVM.exe: Error reading 0x400 bytes at 00007ff79fe80000 (rva 0x0, #0, headers) from memory: 0x8000000d 3394.22a0: supR3HardNtEnableThreadCreation: