3e0c.2d34: Log file opened: 6.1.12r139181 g_hStartupLog=00000000000002a8 g_uNtVerCombined=0xa047ba00 3e0c.2d34: \SystemRoot\System32\ntdll.dll: 3e0c.2d34: CreationTime: 2020-07-27T09:29:22.468662600Z 3e0c.2d34: LastWriteTime: 2020-07-27T09:29:22.507631900Z 3e0c.2d34: ChangeTime: 2020-07-28T06:10:52.472083500Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x1e8460 3e0c.2d34: NT Headers: 0xd8 3e0c.2d34: Timestamp: 0xb29ecf52 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0xb29ecf52 3e0c.2d34: Image Version: 10.0 3e0c.2d34: SizeOfImage: 0x1f0000 (2031616) 3e0c.2d34: Resource Dir: 0x17f000 LB 0x6f310 3e0c.2d34: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x17f0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Microsoft® Windows® Operating System 3e0c.2d34: ProductVersion: 10.0.18362.815 3e0c.2d34: FileVersion: 10.0.18362.815 (WinBuild.160101.0800) 3e0c.2d34: FileDescription: NT Layer DLL 3e0c.2d34: \SystemRoot\System32\kernel32.dll: 3e0c.2d34: CreationTime: 2020-07-27T09:28:50.277970100Z 3e0c.2d34: LastWriteTime: 2020-07-27T09:28:50.294953700Z 3e0c.2d34: ChangeTime: 2020-07-28T06:10:41.051213400Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0xb0498 3e0c.2d34: NT Headers: 0xe8 3e0c.2d34: Timestamp: 0xce6bbd73 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0xce6bbd73 3e0c.2d34: Image Version: 10.0 3e0c.2d34: SizeOfImage: 0xb2000 (729088) 3e0c.2d34: Resource Dir: 0xb0000 LB 0x520 3e0c.2d34: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0xb00b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Microsoft® Windows® Operating System 3e0c.2d34: ProductVersion: 10.0.18362.959 3e0c.2d34: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 3e0c.2d34: FileDescription: Windows NT BASE API Client DLL 3e0c.2d34: \SystemRoot\System32\KernelBase.dll: 3e0c.2d34: CreationTime: 2020-07-27T09:29:23.091189900Z 3e0c.2d34: LastWriteTime: 2020-07-27T09:29:23.150058300Z 3e0c.2d34: ChangeTime: 2020-07-28T06:10:50.315875600Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x2a4058 3e0c.2d34: NT Headers: 0xf8 3e0c.2d34: Timestamp: 0x7b90c1b5 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x7b90c1b5 3e0c.2d34: Image Version: 10.0 3e0c.2d34: SizeOfImage: 0x2a4000 (2768896) 3e0c.2d34: Resource Dir: 0x27e000 LB 0x548 3e0c.2d34: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x27e0b0 LB 0x3bc, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Microsoft® Windows® Operating System 3e0c.2d34: ProductVersion: 10.0.18362.959 3e0c.2d34: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 3e0c.2d34: FileDescription: Windows NT BASE API Client DLL 3e0c.2d34: \SystemRoot\System32\apisetschema.dll: 3e0c.2d34: CreationTime: 2019-03-19T04:43:54.837151500Z 3e0c.2d34: LastWriteTime: 2019-03-19T04:43:54.837151500Z 3e0c.2d34: ChangeTime: 2020-07-27T09:30:52.160553000Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x1d028 3e0c.2d34: NT Headers: 0xc8 3e0c.2d34: Timestamp: 0xd6ced080 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0xd6ced080 3e0c.2d34: Image Version: 10.0 3e0c.2d34: SizeOfImage: 0x1e000 (122880) 3e0c.2d34: Resource Dir: 0x1d000 LB 0x408 3e0c.2d34: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x1d060 LB 0x3a8, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Microsoft® Windows® Operating System 3e0c.2d34: ProductVersion: 10.0.18362.1 3e0c.2d34: FileVersion: 10.0.18362.1 (WinBuild.160101.0800) 3e0c.2d34: FileDescription: ApiSet Schema DLL 3e0c.2d34: NtOpenDirectoryObject failed on \Driver: 0xc0000022 3e0c.2d34: supR3HardenedWinFindAdversaries: 0x840 3e0c.2d34: \SystemRoot\System32\drivers\klflt.sys: 3e0c.2d34: CreationTime: 2020-03-06T08:53:28.856343500Z 3e0c.2d34: LastWriteTime: 2020-03-12T20:48:02.000000000Z 3e0c.2d34: ChangeTime: 2020-05-15T10:01:19.828084100Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x3f100 3e0c.2d34: NT Headers: 0xf8 3e0c.2d34: Timestamp: 0x5e6a66e9 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x5e6a66e9 3e0c.2d34: Image Version: 6.1 3e0c.2d34: SizeOfImage: 0x4d000 (315392) 3e0c.2d34: Resource Dir: 0x4a000 LB 0x430 3e0c.2d34: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x4a060 LB 0x3d0, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Coretech Delivery 3e0c.2d34: ProductVersion: 30.289.132.0-e369c7d411 3e0c.2d34: FileVersion: 30.289.132.0 3e0c.2d34: FileDescription: Filter Core [fre_win7_x64] 3e0c.2d34: \SystemRoot\System32\drivers\klif.sys: 3e0c.2d34: CreationTime: 2020-03-06T08:53:28.861361800Z 3e0c.2d34: LastWriteTime: 2020-03-12T20:48:04.000000000Z 3e0c.2d34: ChangeTime: 2020-05-15T10:01:19.795147700Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x12d500 3e0c.2d34: NT Headers: 0x100 3e0c.2d34: Timestamp: 0x5e6a6704 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x5e6a6704 3e0c.2d34: Image Version: 6.1 3e0c.2d34: SizeOfImage: 0x12f000 (1241088) 3e0c.2d34: Resource Dir: 0x125000 LB 0x3410 3e0c.2d34: [Version info resource found at 0x120! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x128028 LB 0x3e8, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Coretech Delivery 3e0c.2d34: ProductVersion: 30.289.132.0-e369c7d411 3e0c.2d34: FileVersion: 30.289.132.0 3e0c.2d34: FileDescription: Core System Interceptors [fre_win7_x64] 3e0c.2d34: \SystemRoot\System32\drivers\klim6.sys: 3e0c.2d34: CreationTime: 2019-01-28T00:49:40.000000000Z 3e0c.2d34: LastWriteTime: 2020-03-05T01:33:42.000000000Z 3e0c.2d34: ChangeTime: 2020-05-15T10:01:20.628593700Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x159f0 3e0c.2d34: NT Headers: 0xe0 3e0c.2d34: Timestamp: 0x8c875967 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x8c875967 3e0c.2d34: Image Version: 6.1 3e0c.2d34: SizeOfImage: 0x12000 (73728) 3e0c.2d34: Resource Dir: 0x10000 LB 0x448 3e0c.2d34: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x10060 LB 0x3e4, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Coretech Delivery 3e0c.2d34: ProductVersion: 30.289.126.0-2a58c6003b 3e0c.2d34: FileVersion: 30.289.126.0 3e0c.2d34: FileDescription: Packet Network Filter [fre_win7_x64] 3e0c.2d34: \SystemRoot\System32\drivers\kneps.sys: 3e0c.2d34: CreationTime: 2019-04-29T04:50:14.000000000Z 3e0c.2d34: LastWriteTime: 2020-03-06T02:31:48.000000000Z 3e0c.2d34: ChangeTime: 2020-05-15T10:01:20.486058100Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x44300 3e0c.2d34: NT Headers: 0xf8 3e0c.2d34: Timestamp: 0x359fc650 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x359fc650 3e0c.2d34: Image Version: 6.1 3e0c.2d34: SizeOfImage: 0x44000 (278528) 3e0c.2d34: Resource Dir: 0x41000 LB 0x440 3e0c.2d34: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x41060 LB 0x3dc, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: Coretech Delivery 3e0c.2d34: ProductVersion: 30.289.126.0-2a58c6003b 3e0c.2d34: FileVersion: 30.289.126.0 3e0c.2d34: FileDescription: Network Processor [fre_win7_x64] 3e0c.2d34: \SystemRoot\System32\drivers\inspect.sys: 3e0c.2d34: CreationTime: 2019-10-22T10:41:08.000000000Z 3e0c.2d34: LastWriteTime: 2019-10-22T10:41:08.000000000Z 3e0c.2d34: ChangeTime: 2019-12-12T12:56:19.421137100Z 3e0c.2d34: FileAttributes: 0x20 3e0c.2d34: Size: 0x137c8 3e0c.2d34: NT Headers: 0xf8 3e0c.2d34: Timestamp: 0x5cfbc135 3e0c.2d34: Machine: 0x8664 - amd64 3e0c.2d34: Timestamp: 0x5cfbc135 3e0c.2d34: Image Version: 10.0 3e0c.2d34: SizeOfImage: 0x14000 (81920) 3e0c.2d34: Resource Dir: 0x12000 LB 0x690 3e0c.2d34: [Version info resource found at 0x50! (ID/Name: 0x1; SubID/SubName: 0x409)] 3e0c.2d34: [Raw version resource data: 0x12070 LB 0x2fc, codepage 0x0 (reserved 0x0)] 3e0c.2d34: ProductName: DOZOR Agent 3e0c.2d34: ProductVersion: 3.3.0.0 3e0c.2d34: FileVersion: 1.0.1.3 3e0c.2d34: FileDescription: Process Control Driver 3e0c.2d34: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 3e0c.2d34: Calling main() 3e0c.2d34: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x3 3e0c.2d34: supR3HardenedWinInitAppBin(0x3): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 3e0c.2d34: System32: \Device\HarddiskVolume4\Windows\System32 3e0c.2d34: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS 3e0c.2d34: KnownDllPath: C:\WINDOWS\System32 3e0c.2d34: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 3e0c.2d34: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 3e0c.2d34: supR3HardNtEnableThreadCreationEx: 3e0c.2d34: bcrypt.dll loaded at 00007fff6ccd0000, BCryptOpenAlgorithmProvider at 00007fff6ccd4c70, preloading providers: 3e0c.2d34: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=000000000076c980) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=000000000076af80) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=0000000000774030) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=0000000000773490) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=0000000000775290) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=0000000000775590) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=000000000076fa10) 3e0c.2d34: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=00000000007f72e0) 3e0c.2d34: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000000 pwszName=\SystemRoot\System32\ntdll.dll 3e0c.2d34: supR3HardNtViCallWinVerifyTrustCatFile: New context 0000000000803300 3e0c.2d34: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000803300 3e0c.2d34: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=2F110B40CF67FEF4EFA84C23431B3B42233E381F 3e0c.2d34: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package0416~31bf3856ad364e35~amd64~~10.0.18362.959.cat'; file='\SystemRoot\System32\ntdll.dll' 3e0c.2d34: g_pfnWinVerifyTrust=00007fff6cc561f0 3e0c.2d34: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #32 'msasn1.dll'. 3e0c.2d34: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\crypt32.dll) WinVerifyTrust 3e0c.2d34: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\crypt32.dll 3e0c.2d34: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 3e0c.2d34: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'msasn1.dll'. 3e0c.2d34: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'crypt32.dll'. 3e0c.2d34: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #27 'rpcrt4.dll'. 3e0c.2d34: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\wintrust.dll) WinVerifyTrust 3e0c.2d34: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\wintrust.dll 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x55c4ef205ae3d700 Email=ssl@server.9tv.co.il, CN=archive.9tv.co.il 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x5ad46780fa5df300 DC=com, DC=microsoft, CN=Microsoft Root Certificate Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x52f35a23ad43e700 Email=ssl@server.9tv.co.il, CN=www.archive.9tv.co.il 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xea5386456178582b C=ZA, ST=Western Cape, L=Durbanville, O=Thawte, OU=Thawte Certification, CN=Thawte Timestamping CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x3be670c1bd02a900 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xe991ee72b03db500 C=US, O=Symantec Corporation, CN=Symantec Enterprise Mobile Root for Microsoft 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xdee05e72d2fce000 CN=spb2wks002.puls.local 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x646e3fe3ba08df00 C=US, O=MSFT, CN=Microsoft Authenticode(tm) Root Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xbee9d764924fbb00 O=AO Kaspersky Lab, CN=Kaspersky Endpoint Security Personal Root Certificate 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x996f072e2fa7ec00 CN=spb2wks002.puls.local 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xd140ebc339a98a2f CN=WZTeam 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x39c174e2854aa600 CN=TRASSIR 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xf27194c5fa02d100 C=EN, CN=DigiCert SHA2 Extended Validation Server CA 2 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xece4e4289e08b900 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xf3bb4d7e894b420 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft ECC TS Root Certificate Authority 2018 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x43a9cc371ff5385a O=Microsoft Trust Network, OU=Microsoft Corporation, OU=Microsoft Time Stamping Service Root, OU=Copyright (c) 1997 Microsoft Corp. 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x2e2d2c7c68f0202e O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign Time Stamping Service Root, OU=NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc. 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xcec3d46562b9be8e C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft ECC Product Root Certificate Authority 2018 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xca58a05dd401ae00 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Time Stamp Root Certificate Authority 2014 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x61a3a33f81aace00 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Object 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x50bb81640c01cb00 C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x6b7bdc34cd37bb00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x83085097e9afdf00 O=Digital Signature Trust Co., CN=DST Root CA X3 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x780679907625cc00 OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xeae16ef49d40be00 C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xc6536f24d57ae723 C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x9403a4b8727eb000 C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xd944bca189a00 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xc6fa4243b695b600 C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xa3ce8d99e60eda00 C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x560ad29254e89100 C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xa671e9fec832b700 C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xa8de7211e13be200 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xd45980fbf0a0ac00 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xc9edb72b684ba00 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xf5cd95e581a4ab00 C=US, O=SecureTrust Corporation, CN=SecureTrust CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x6f2ebe0e24cfa600 OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x14018a1bf29e595c C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x7c4fd32ec1b1ce00 C=PL, O=Unizeto Sp. z o.o., CN=Certum CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x1b8578514b74ac00 C=US, O=WFA Hotspot 2.0, CN=Hotspot 2.0 Trust Root CA - 03 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x357a29080824af00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x59faf1086271bf00 C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x3401b15e3761c700 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2008 VeriSign, Inc. - For authorized use only, CN=VeriSign Universal Root Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xc30e361765128000 C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x491857ead79dde00 C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xc2ba72a37dfbe300 C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xcec3d46562b9be8e C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft ECC Product Root Certificate Authority 2018 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x8043e4ce150ead00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xf2e6331af7b700 C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x37c8415723cdb100 DC=local, DC=puls, CN=PULS-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xe207b6374ba7a700 DC=local, DC=puls, CN=puls-RDP1-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xea2fcc21464fba00 DC=local, DC=puls, CN=serv-p 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x74d616fa7976c000 DC=local, DC=puls, CN=serv-p 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x70d86403035daa00 DC=local, DC=puls, CN=PULS-SERV2-P-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x50b559415accb800 DC=local, DC=puls, CN=PULS-SERV2-P-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x5e9001153632c500 DC=local, DC=puls, CN=serv-p 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x1622ad47ddeec900 DC=local, DC=puls, CN=serv-p 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xfe1db9b6ec9e9000 DC=local, DC=puls, CN=PULS-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x627454ff6824be00 DC=local, DC=puls, CN=PULS-SERV2-P-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0x70d86403035daa00 DC=local, DC=puls, CN=PULS-SERV2-P-CA 3e0c.2d34: supR3HardenedWinIsDesiredRootCA: Adding 0xe18c1732f20ab00 DC=local, DC=puls, CN=puls-V-PRINT-SRV-CA 3e0c.2d34: supR3HardenedWinRetrieveTrustedRootCAs: cAdded=64 3e0c.2d34: SUPR3HardenedMain: Load Runtime... 3e0c.2d34: SUPR3HardenedMain: Load TrustedMain... 3e0c.2d34: SUPR3HardenedMain: Calling TrustedMain (00007fff1e4616c0)... 3204.4414: Log file opened: 6.1.12r139181 g_hStartupLog=00000000000002b0 g_uNtVerCombined=0xa047ba00 3204.4414: \SystemRoot\System32\ntdll.dll: 3204.4414: CreationTime: 2020-07-27T09:29:22.468662600Z 3204.4414: LastWriteTime: 2020-07-27T09:29:22.507631900Z 3204.4414: ChangeTime: 2020-07-28T06:10:52.472083500Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x1e8460 3204.4414: NT Headers: 0xd8 3204.4414: Timestamp: 0xb29ecf52 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0xb29ecf52 3204.4414: Image Version: 10.0 3204.4414: SizeOfImage: 0x1f0000 (2031616) 3204.4414: Resource Dir: 0x17f000 LB 0x6f310 3204.4414: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x17f0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Microsoft® Windows® Operating System 3204.4414: ProductVersion: 10.0.18362.815 3204.4414: FileVersion: 10.0.18362.815 (WinBuild.160101.0800) 3204.4414: FileDescription: NT Layer DLL 3204.4414: \SystemRoot\System32\kernel32.dll: 3204.4414: CreationTime: 2020-07-27T09:28:50.277970100Z 3204.4414: LastWriteTime: 2020-07-27T09:28:50.294953700Z 3204.4414: ChangeTime: 2020-07-28T06:10:41.051213400Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0xb0498 3204.4414: NT Headers: 0xe8 3204.4414: Timestamp: 0xce6bbd73 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0xce6bbd73 3204.4414: Image Version: 10.0 3204.4414: SizeOfImage: 0xb2000 (729088) 3204.4414: Resource Dir: 0xb0000 LB 0x520 3204.4414: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0xb00b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Microsoft® Windows® Operating System 3204.4414: ProductVersion: 10.0.18362.959 3204.4414: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 3204.4414: FileDescription: Windows NT BASE API Client DLL 3204.4414: \SystemRoot\System32\KernelBase.dll: 3204.4414: CreationTime: 2020-07-27T09:29:23.091189900Z 3204.4414: LastWriteTime: 2020-07-27T09:29:23.150058300Z 3204.4414: ChangeTime: 2020-07-28T06:10:50.315875600Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x2a4058 3204.4414: NT Headers: 0xf8 3204.4414: Timestamp: 0x7b90c1b5 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x7b90c1b5 3204.4414: Image Version: 10.0 3204.4414: SizeOfImage: 0x2a4000 (2768896) 3204.4414: Resource Dir: 0x27e000 LB 0x548 3204.4414: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x27e0b0 LB 0x3bc, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Microsoft® Windows® Operating System 3204.4414: ProductVersion: 10.0.18362.959 3204.4414: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 3204.4414: FileDescription: Windows NT BASE API Client DLL 3204.4414: \SystemRoot\System32\apisetschema.dll: 3204.4414: CreationTime: 2019-03-19T04:43:54.837151500Z 3204.4414: LastWriteTime: 2019-03-19T04:43:54.837151500Z 3204.4414: ChangeTime: 2020-07-27T09:30:52.160553000Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x1d028 3204.4414: NT Headers: 0xc8 3204.4414: Timestamp: 0xd6ced080 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0xd6ced080 3204.4414: Image Version: 10.0 3204.4414: SizeOfImage: 0x1e000 (122880) 3204.4414: Resource Dir: 0x1d000 LB 0x408 3204.4414: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x1d060 LB 0x3a8, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Microsoft® Windows® Operating System 3204.4414: ProductVersion: 10.0.18362.1 3204.4414: FileVersion: 10.0.18362.1 (WinBuild.160101.0800) 3204.4414: FileDescription: ApiSet Schema DLL 3204.4414: NtOpenDirectoryObject failed on \Driver: 0xc0000022 3204.4414: supR3HardenedWinFindAdversaries: 0x840 3204.4414: \SystemRoot\System32\drivers\klflt.sys: 3204.4414: CreationTime: 2020-03-06T08:53:28.856343500Z 3204.4414: LastWriteTime: 2020-03-12T20:48:02.000000000Z 3204.4414: ChangeTime: 2020-05-15T10:01:19.828084100Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x3f100 3204.4414: NT Headers: 0xf8 3204.4414: Timestamp: 0x5e6a66e9 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x5e6a66e9 3204.4414: Image Version: 6.1 3204.4414: SizeOfImage: 0x4d000 (315392) 3204.4414: Resource Dir: 0x4a000 LB 0x430 3204.4414: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x4a060 LB 0x3d0, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Coretech Delivery 3204.4414: ProductVersion: 30.289.132.0-e369c7d411 3204.4414: FileVersion: 30.289.132.0 3204.4414: FileDescription: Filter Core [fre_win7_x64] 3204.4414: \SystemRoot\System32\drivers\klif.sys: 3204.4414: CreationTime: 2020-03-06T08:53:28.861361800Z 3204.4414: LastWriteTime: 2020-03-12T20:48:04.000000000Z 3204.4414: ChangeTime: 2020-05-15T10:01:19.795147700Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x12d500 3204.4414: NT Headers: 0x100 3204.4414: Timestamp: 0x5e6a6704 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x5e6a6704 3204.4414: Image Version: 6.1 3204.4414: SizeOfImage: 0x12f000 (1241088) 3204.4414: Resource Dir: 0x125000 LB 0x3410 3204.4414: [Version info resource found at 0x120! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x128028 LB 0x3e8, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Coretech Delivery 3204.4414: ProductVersion: 30.289.132.0-e369c7d411 3204.4414: FileVersion: 30.289.132.0 3204.4414: FileDescription: Core System Interceptors [fre_win7_x64] 3204.4414: \SystemRoot\System32\drivers\klim6.sys: 3204.4414: CreationTime: 2019-01-28T00:49:40.000000000Z 3204.4414: LastWriteTime: 2020-03-05T01:33:42.000000000Z 3204.4414: ChangeTime: 2020-05-15T10:01:20.628593700Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x159f0 3204.4414: NT Headers: 0xe0 3204.4414: Timestamp: 0x8c875967 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x8c875967 3204.4414: Image Version: 6.1 3204.4414: SizeOfImage: 0x12000 (73728) 3204.4414: Resource Dir: 0x10000 LB 0x448 3204.4414: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x10060 LB 0x3e4, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Coretech Delivery 3204.4414: ProductVersion: 30.289.126.0-2a58c6003b 3204.4414: FileVersion: 30.289.126.0 3204.4414: FileDescription: Packet Network Filter [fre_win7_x64] 3204.4414: \SystemRoot\System32\drivers\kneps.sys: 3204.4414: CreationTime: 2019-04-29T04:50:14.000000000Z 3204.4414: LastWriteTime: 2020-03-06T02:31:48.000000000Z 3204.4414: ChangeTime: 2020-05-15T10:01:20.486058100Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x44300 3204.4414: NT Headers: 0xf8 3204.4414: Timestamp: 0x359fc650 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x359fc650 3204.4414: Image Version: 6.1 3204.4414: SizeOfImage: 0x44000 (278528) 3204.4414: Resource Dir: 0x41000 LB 0x440 3204.4414: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x41060 LB 0x3dc, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: Coretech Delivery 3204.4414: ProductVersion: 30.289.126.0-2a58c6003b 3204.4414: FileVersion: 30.289.126.0 3204.4414: FileDescription: Network Processor [fre_win7_x64] 3204.4414: \SystemRoot\System32\drivers\inspect.sys: 3204.4414: CreationTime: 2019-10-22T10:41:08.000000000Z 3204.4414: LastWriteTime: 2019-10-22T10:41:08.000000000Z 3204.4414: ChangeTime: 2019-12-12T12:56:19.421137100Z 3204.4414: FileAttributes: 0x20 3204.4414: Size: 0x137c8 3204.4414: NT Headers: 0xf8 3204.4414: Timestamp: 0x5cfbc135 3204.4414: Machine: 0x8664 - amd64 3204.4414: Timestamp: 0x5cfbc135 3204.4414: Image Version: 10.0 3204.4414: SizeOfImage: 0x14000 (81920) 3204.4414: Resource Dir: 0x12000 LB 0x690 3204.4414: [Version info resource found at 0x50! (ID/Name: 0x1; SubID/SubName: 0x409)] 3204.4414: [Raw version resource data: 0x12070 LB 0x2fc, codepage 0x0 (reserved 0x0)] 3204.4414: ProductName: DOZOR Agent 3204.4414: ProductVersion: 3.3.0.0 3204.4414: FileVersion: 1.0.1.3 3204.4414: FileDescription: Process Control Driver 3204.4414: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 3204.4414: Calling main() 3204.4414: SUPR3HardenedMain: pszProgName=VBoxHeadless fFlags=0x0 3204.4414: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 3204.4414: SUPR3HardenedMain: Respawn #1 3204.4414: System32: \Device\HarddiskVolume4\Windows\System32 3204.4414: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS 3204.4414: KnownDllPath: C:\WINDOWS\System32 3204.4414: supR3HardenedWinInit: Performing a limited self purification... 3204.4414: supHardNtVpScanVirtualMemory: enmKind=SELF_PURIFICATION 3204.4414: *0000000000000000-0000000000d9ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000da0000-0000000000daffff 0x0004/0x0004 0x0040000 3204.4414: *0000000000db0000-0000000000db0fff 0x0004/0x0004 0x0020000 3204.4414: 0000000000db1000-0000000000dbffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000dc0000-0000000000ddafff 0x0002/0x0002 0x0040000 3204.4414: 0000000000ddb000-0000000000ddffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000de0000-0000000000de0fff 0x0020/0x0020 0x0020000 !! 3204.4414: 0000000000de1000-0000000000deffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000df0000-0000000000df3fff 0x0002/0x0002 0x0040000 3204.4414: 0000000000df4000-0000000000dfffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000e00000-0000000000f5afff 0x0000/0x0004 0x0020000 3204.4414: 0000000000f5b000-0000000000f65fff 0x0004/0x0004 0x0020000 3204.4414: 0000000000f66000-0000000000ffffff 0x0000/0x0004 0x0020000 3204.4414: *0000000001000000-00000000010b0fff 0x0000/0x0004 0x0020000 3204.4414: 00000000010b1000-00000000010b3fff 0x0104/0x0004 0x0020000 3204.4414: 00000000010b4000-00000000010fffff 0x0004/0x0004 0x0020000 3204.4414: *0000000001100000-0000000001101fff 0x0004/0x0004 0x0020000 3204.4414: 0000000001102000-000000000110ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000001110000-0000000001111fff 0x0004/0x0004 0x0020000 3204.4414: 0000000001112000-0000000001141fff 0x0000/0x0004 0x0020000 3204.4414: 0000000001142000-000000000114ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000001150000-0000000001153fff 0x0002/0x0002 0x0040000 3204.4414: 0000000001154000-0000000001157fff 0x0000/0x0002 0x0040000 3204.4414: 0000000001158000-000000000115ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000001160000-0000000001160fff 0x0004/0x0004 0x0020000 3204.4414: 0000000001161000-0000000001191fff 0x0000/0x0004 0x0020000 3204.4414: 0000000001192000-000000000119ffff 0x0001/0x0000 0x0000000 3204.4414: *00000000011a0000-0000000001219fff 0x0004/0x0004 0x0020000 3204.4414: 000000000121a000-000000000121afff 0x0000/0x0004 0x0020000 3204.4414: 000000000121b000-000000000122dfff 0x0004/0x0004 0x0020000 3204.4414: 000000000122e000-0000000001230fff 0x0000/0x0004 0x0020000 3204.4414: 0000000001231000-0000000001235fff 0x0004/0x0004 0x0020000 3204.4414: 0000000001236000-0000000001238fff 0x0000/0x0004 0x0020000 3204.4414: 0000000001239000-000000000123afff 0x0004/0x0004 0x0020000 3204.4414: 000000000123b000-0000000001250fff 0x0000/0x0004 0x0020000 3204.4414: 0000000001251000-0000000001251fff 0x0004/0x0004 0x0020000 3204.4414: 0000000001252000-000000000129ffff 0x0000/0x0004 0x0020000 3204.4414: *00000000012a0000-0000000001366fff 0x0002/0x0002 0x0040000 3204.4414: 0000000001367000-000000000136ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000001370000-000000000146afff 0x0000/0x0004 0x0020000 3204.4414: 000000000146b000-000000000146dfff 0x0104/0x0004 0x0020000 3204.4414: 000000000146e000-000000000146ffff 0x0004/0x0004 0x0020000 3204.4414: *0000000001470000-000000000156afff 0x0000/0x0004 0x0020000 3204.4414: 000000000156b000-000000000156dfff 0x0104/0x0004 0x0020000 3204.4414: 000000000156e000-000000000156ffff 0x0004/0x0004 0x0020000 3204.4414: *0000000001570000-000000000166afff 0x0000/0x0004 0x0020000 3204.4414: 000000000166b000-000000000166dfff 0x0104/0x0004 0x0020000 3204.4414: 000000000166e000-000000000166ffff 0x0004/0x0004 0x0020000 3204.4414: *0000000001670000-0000000001683fff 0x0002/0x0002 0x0040000 3204.4414: 0000000001684000-000000000186ffff 0x0000/0x0002 0x0040000 3204.4414: *0000000001870000-00000000019f0fff 0x0002/0x0002 0x0040000 3204.4414: 00000000019f1000-00000000019fffff 0x0001/0x0000 0x0000000 3204.4414: *0000000001a00000-0000000001aa0fff 0x0002/0x0002 0x0040000 3204.4414: 0000000001aa1000-0000000002e00fff 0x0000/0x0002 0x0040000 3204.4414: 0000000002e01000-0000000002e0ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000002e10000-0000000002f0bfff 0x0000/0x0004 0x0020000 3204.4414: 0000000002f0c000-0000000002f0efff 0x0104/0x0004 0x0020000 3204.4414: 0000000002f0f000-0000000002f0ffff 0x0004/0x0004 0x0020000 3204.4414: *0000000002f10000-0000000002f11fff 0x0004/0x0004 0x0020000 3204.4414: 0000000002f12000-0000000002f41fff 0x0000/0x0004 0x0020000 3204.4414: 0000000002f42000-0000000002f7ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000002f80000-0000000002f83fff 0x0004/0x0004 0x0020000 3204.4414: 0000000002f84000-0000000002f8ffff 0x0000/0x0004 0x0020000 3204.4414: 0000000002f90000-0000000002f9ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000002fa0000-0000000002fa6fff 0x0004/0x0004 0x0020000 3204.4414: 0000000002fa7000-0000000002faffff 0x0000/0x0004 0x0020000 3204.4414: *0000000002fb0000-00000000043b0fff 0x0004/0x0004 0x0040000 3204.4414: 00000000043b1000-00000000043bffff 0x0001/0x0000 0x0000000 3204.4414: *00000000043c0000-00000000046f6fff 0x0002/0x0002 0x0040000 3204.4414: 00000000046f7000-00000000046fffff 0x0001/0x0000 0x0000000 3204.4414: *0000000004700000-000000000471cfff 0x0004/0x0004 0x0020000 3204.4414: 000000000471d000-00000000047fffff 0x0000/0x0004 0x0020000 3204.4414: 0000000004800000-0000000004acffff 0x0001/0x0000 0x0000000 3204.4414: *0000000004ad0000-0000000004adefff 0x0004/0x0004 0x0020000 3204.4414: 0000000004adf000-0000000004adffff 0x0000/0x0004 0x0020000 3204.4414: *0000000004ae0000-0000000004ae9fff 0x0000/0x0004 0x0020000 3204.4414: 0000000004aea000-0000000004cdafff 0x0004/0x0004 0x0020000 3204.4414: 0000000004cdb000-0000000004cdbfff 0x0000/0x0004 0x0020000 3204.4414: 0000000004cdc000-000000007ffdffff 0x0001/0x0000 0x0000000 3204.4414: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 3204.4414: 000000007ffe1000-000000007ffeefff 0x0001/0x0000 0x0000000 3204.4414: *000000007ffef000-000000007ffeffff 0x0002/0x0002 0x0020000 3204.4414: 000000007fff0000-00007ff43b86ffff 0x0001/0x0000 0x0000000 3204.4414: *00007ff43b870000-00007ff43b874fff 0x0002/0x0002 0x0040000 3204.4414: 00007ff43b875000-00007ff43b96ffff 0x0000/0x0002 0x0040000 3204.4414: *00007ff43b970000-00007ff53b98ffff 0x0000/0x0004 0x0020000 3204.4414: *00007ff53b990000-00007ff53d98ffff 0x0000/0x0004 0x0020000 3204.4414: 00007ff53d990000-00007ff53d990fff 0x0004/0x0004 0x0020000 3204.4414: 00007ff53d991000-00007ff53d99ffff 0x0001/0x0000 0x0000000 3204.4414: *00007ff53d9a0000-00007ff53d9a0fff 0x0002/0x0002 0x0040000 3204.4414: 00007ff53d9a1000-00007ff53d9affff 0x0001/0x0000 0x0000000 3204.4414: *00007ff53d9b0000-00007ff53d9d2fff 0x0002/0x0002 0x0040000 3204.4414: 00007ff53d9d3000-00007ff62c2effff 0x0001/0x0000 0x0000000 3204.4414: *00007ff62c2f0000-00007ff62c2f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c2f1000-00007ff62c366fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c367000-00007ff62c367fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c368000-00007ff62c3affff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3b0000-00007ff62c3b2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3b3000-00007ff62c3b5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3b6000-00007ff62c3b8fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3b9000-00007ff62c3b9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3ba000-00007ff62c3bbfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3bc000-00007ff62c3bcfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c3bd000-00007ff62c405fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 3204.4414: 00007ff62c406000-00007fff6815ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff68160000-00007fff68160fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\samcli.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68160000 LB 0x1000 (base 00007fff68160000) - 'samcli.dll' 3204.4414: 00007fff68161000-00007fff6816efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\samcli.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68161000 LB 0xe000 (base 00007fff68160000) - 'samcli.dll' 3204.4414: 00007fff6816f000-00007fff68172fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\samcli.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6816f000 LB 0x4000 (base 00007fff68160000) - 'samcli.dll' 3204.4414: 00007fff68173000-00007fff68173fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\samcli.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68173000 LB 0x1000 (base 00007fff68160000) - 'samcli.dll' 3204.4414: 00007fff68174000-00007fff68177fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\samcli.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68174000 LB 0x4000 (base 00007fff68160000) - 'samcli.dll' 3204.4414: 00007fff68178000-00007fff6817ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff68180000-00007fff68180fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\winmmbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68180000 LB 0x1000 (base 00007fff68180000) - 'winmmbase.dll' 3204.4414: 00007fff68181000-00007fff6819cfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\winmmbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68181000 LB 0x1c000 (base 00007fff68180000) - 'winmmbase.dll' 3204.4414: 00007fff6819d000-00007fff681a5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\winmmbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6819d000 LB 0x9000 (base 00007fff68180000) - 'winmmbase.dll' 3204.4414: 00007fff681a6000-00007fff681a7fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\winmmbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681a6000 LB 0x2000 (base 00007fff68180000) - 'winmmbase.dll' 3204.4414: 00007fff681a8000-00007fff681acfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\winmmbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681a8000 LB 0x5000 (base 00007fff68180000) - 'winmmbase.dll' 3204.4414: 00007fff681ad000-00007fff681affff 0x0001/0x0000 0x0000000 3204.4414: *00007fff681b0000-00007fff681b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\mpr.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681b0000 LB 0x1000 (base 00007fff681b0000) - 'mpr.dll' 3204.4414: 00007fff681b1000-00007fff681c0fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\mpr.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681b1000 LB 0x10000 (base 00007fff681b0000) - 'mpr.dll' 3204.4414: 00007fff681c1000-00007fff681c5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\mpr.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681c1000 LB 0x5000 (base 00007fff681b0000) - 'mpr.dll' 3204.4414: 00007fff681c6000-00007fff681c6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\mpr.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681c6000 LB 0x1000 (base 00007fff681b0000) - 'mpr.dll' 3204.4414: 00007fff681c7000-00007fff681cafff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\mpr.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681c7000 LB 0x4000 (base 00007fff681b0000) - 'mpr.dll' 3204.4414: 00007fff681cb000-00007fff681cffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff681d0000-00007fff681d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\netapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681d0000 LB 0x1000 (base 00007fff681d0000) - 'netapi32.dll' 3204.4414: 00007fff681d1000-00007fff681dafff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\netapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681d1000 LB 0xa000 (base 00007fff681d0000) - 'netapi32.dll' 3204.4414: 00007fff681db000-00007fff681e1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\netapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681db000 LB 0x7000 (base 00007fff681d0000) - 'netapi32.dll' 3204.4414: 00007fff681e2000-00007fff681e2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\netapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681e2000 LB 0x1000 (base 00007fff681d0000) - 'netapi32.dll' 3204.4414: 00007fff681e3000-00007fff681e6fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\netapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681e3000 LB 0x4000 (base 00007fff681d0000) - 'netapi32.dll' 3204.4414: 00007fff681e7000-00007fff681effff 0x0001/0x0000 0x0000000 3204.4414: *00007fff681f0000-00007fff681f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msacm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681f0000 LB 0x1000 (base 00007fff681f0000) - 'msacm32.dll' 3204.4414: 00007fff681f1000-00007fff68201fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msacm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff681f1000 LB 0x11000 (base 00007fff681f0000) - 'msacm32.dll' 3204.4414: 00007fff68202000-00007fff68206fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msacm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68202000 LB 0x5000 (base 00007fff681f0000) - 'msacm32.dll' 3204.4414: 00007fff68207000-00007fff68207fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msacm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68207000 LB 0x1000 (base 00007fff681f0000) - 'msacm32.dll' 3204.4414: 00007fff68208000-00007fff6820bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msacm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68208000 LB 0x4000 (base 00007fff681f0000) - 'msacm32.dll' 3204.4414: 00007fff6820c000-00007fff6821ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff68220000-00007fff68220fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\version.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68220000 LB 0x1000 (base 00007fff68220000) - 'version.dll' 3204.4414: 00007fff68221000-00007fff68223fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\version.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68221000 LB 0x3000 (base 00007fff68220000) - 'version.dll' 3204.4414: 00007fff68224000-00007fff68225fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\version.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68224000 LB 0x2000 (base 00007fff68220000) - 'version.dll' 3204.4414: 00007fff68226000-00007fff68226fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\version.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68226000 LB 0x1000 (base 00007fff68220000) - 'version.dll' 3204.4414: 00007fff68227000-00007fff68229fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\version.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68227000 LB 0x3000 (base 00007fff68220000) - 'version.dll' 3204.4414: 00007fff6822a000-00007fff68acffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff68ad0000-00007fff68ad0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68ad0000 LB 0x1000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68ad1000-00007fff68c39fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68ad1000 LB 0x169000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68c3a000-00007fff68cbefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68c3a000 LB 0x85000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68cbf000-00007fff68cc0fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68cbf000 LB 0x2000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68cc1000-00007fff68cc3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68cc1000 LB 0x3000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68cc4000-00007fff68cc6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68cc4000 LB 0x3000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68cc7000-00007fff68cdcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\UMInterceptors_x64.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff68cc7000 LB 0x16000 (base 00007fff68ad0000) - 'UMInterceptors_x64.dll' 3204.4414: 00007fff68cdd000-00007fff6bb3ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6bb40000-00007fff6bb40fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\IPHLPAPI.DLL 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6bb40000 LB 0x1000 (base 00007fff6bb40000) - 'IPHLPAPI.DLL' 3204.4414: 00007fff6bb41000-00007fff6bb69fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\IPHLPAPI.DLL 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6bb41000 LB 0x29000 (base 00007fff6bb40000) - 'IPHLPAPI.DLL' 3204.4414: 00007fff6bb6a000-00007fff6bb73fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\IPHLPAPI.DLL 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6bb6a000 LB 0xa000 (base 00007fff6bb40000) - 'IPHLPAPI.DLL' 3204.4414: 00007fff6bb74000-00007fff6bb74fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\IPHLPAPI.DLL 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6bb74000 LB 0x1000 (base 00007fff6bb40000) - 'IPHLPAPI.DLL' 3204.4414: 00007fff6bb75000-00007fff6bb79fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\IPHLPAPI.DLL 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6bb75000 LB 0x5000 (base 00007fff6bb40000) - 'IPHLPAPI.DLL' 3204.4414: 00007fff6bb7a000-00007fff6c61ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c620000-00007fff6c620fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\umpdc.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c620000 LB 0x1000 (base 00007fff6c620000) - 'umpdc.dll' 3204.4414: 00007fff6c621000-00007fff6c628fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\umpdc.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c621000 LB 0x8000 (base 00007fff6c620000) - 'umpdc.dll' 3204.4414: 00007fff6c629000-00007fff6c62bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\umpdc.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c629000 LB 0x3000 (base 00007fff6c620000) - 'umpdc.dll' 3204.4414: 00007fff6c62c000-00007fff6c62cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\umpdc.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c62c000 LB 0x1000 (base 00007fff6c620000) - 'umpdc.dll' 3204.4414: 00007fff6c62d000-00007fff6c62ffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\umpdc.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c62d000 LB 0x3000 (base 00007fff6c620000) - 'umpdc.dll' 3204.4414: 00007fff6c630000-00007fff6c64ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c650000-00007fff6c650fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel.appcore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c650000 LB 0x1000 (base 00007fff6c650000) - 'kernel.appcore.dll' 3204.4414: 00007fff6c651000-00007fff6c654fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel.appcore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c651000 LB 0x4000 (base 00007fff6c650000) - 'kernel.appcore.dll' 3204.4414: 00007fff6c655000-00007fff6c65bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel.appcore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c655000 LB 0x7000 (base 00007fff6c650000) - 'kernel.appcore.dll' 3204.4414: 00007fff6c65c000-00007fff6c65cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel.appcore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c65c000 LB 0x1000 (base 00007fff6c650000) - 'kernel.appcore.dll' 3204.4414: 00007fff6c65d000-00007fff6c660fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel.appcore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c65d000 LB 0x4000 (base 00007fff6c650000) - 'kernel.appcore.dll' 3204.4414: 00007fff6c661000-00007fff6c66ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c670000-00007fff6c670fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\powrprof.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c670000 LB 0x1000 (base 00007fff6c670000) - 'powrprof.dll' 3204.4414: 00007fff6c671000-00007fff6c681fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\powrprof.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c671000 LB 0x11000 (base 00007fff6c670000) - 'powrprof.dll' 3204.4414: 00007fff6c682000-00007fff6c68bfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\powrprof.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c682000 LB 0xa000 (base 00007fff6c670000) - 'powrprof.dll' 3204.4414: 00007fff6c68c000-00007fff6c68cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\powrprof.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c68c000 LB 0x1000 (base 00007fff6c670000) - 'powrprof.dll' 3204.4414: 00007fff6c68d000-00007fff6c6b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\powrprof.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c68d000 LB 0x2d000 (base 00007fff6c670000) - 'powrprof.dll' 3204.4414: 00007fff6c6ba000-00007fff6c6bffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c6c0000-00007fff6c6c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\profapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6c0000 LB 0x1000 (base 00007fff6c6c0000) - 'profapi.dll' 3204.4414: 00007fff6c6c1000-00007fff6c6d4fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\profapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6c1000 LB 0x14000 (base 00007fff6c6c0000) - 'profapi.dll' 3204.4414: 00007fff6c6d5000-00007fff6c6dcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\profapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6d5000 LB 0x8000 (base 00007fff6c6c0000) - 'profapi.dll' 3204.4414: 00007fff6c6dd000-00007fff6c6ddfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\profapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6dd000 LB 0x1000 (base 00007fff6c6c0000) - 'profapi.dll' 3204.4414: 00007fff6c6de000-00007fff6c6e2fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\profapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6de000 LB 0x5000 (base 00007fff6c6c0000) - 'profapi.dll' 3204.4414: 00007fff6c6e3000-00007fff6c6effff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c6f0000-00007fff6c6f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\win32u.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6f0000 LB 0x1000 (base 00007fff6c6f0000) - 'win32u.dll' 3204.4414: 00007fff6c6f1000-00007fff6c6fafff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\win32u.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6f1000 LB 0xa000 (base 00007fff6c6f0000) - 'win32u.dll' 3204.4414: 00007fff6c6fb000-00007fff6c709fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\win32u.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c6fb000 LB 0xf000 (base 00007fff6c6f0000) - 'win32u.dll' 3204.4414: 00007fff6c70a000-00007fff6c70afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\win32u.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c70a000 LB 0x1000 (base 00007fff6c6f0000) - 'win32u.dll' 3204.4414: 00007fff6c70b000-00007fff6c710fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\win32u.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6c70b000 LB 0x6000 (base 00007fff6c6f0000) - 'win32u.dll' 3204.4414: 00007fff6c711000-00007fff6c7cffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6c7d0000-00007fff6c7d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6c7d1000-00007fff6c8d5fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6c8d6000-00007fff6ca38fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6ca39000-00007fff6ca3cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6ca3d000-00007fff6ca3dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6ca3e000-00007fff6ca73fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 3204.4414: 00007fff6ca74000-00007fff6ca7ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ca80000-00007fff6ca80fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ucrtbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ca80000 LB 0x1000 (base 00007fff6ca80000) - 'ucrtbase.dll' 3204.4414: 00007fff6ca81000-00007fff6cb31fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ucrtbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ca81000 LB 0xb1000 (base 00007fff6ca80000) - 'ucrtbase.dll' 3204.4414: 00007fff6cb32000-00007fff6cb69fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ucrtbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cb32000 LB 0x38000 (base 00007fff6ca80000) - 'ucrtbase.dll' 3204.4414: 00007fff6cb6a000-00007fff6cb6cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ucrtbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cb6a000 LB 0x3000 (base 00007fff6ca80000) - 'ucrtbase.dll' 3204.4414: 00007fff6cb6d000-00007fff6cb79fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ucrtbase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cb6d000 LB 0xd000 (base 00007fff6ca80000) - 'ucrtbase.dll' 3204.4414: 00007fff6cb7a000-00007fff6cb7ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6cb80000-00007fff6cb80fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cb80000 LB 0x1000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cb81000-00007fff6cbb3fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cb81000 LB 0x33000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cbb4000-00007fff6cbc1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbb4000 LB 0xe000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cbc2000-00007fff6cbc2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbc2000 LB 0x1000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cbc3000-00007fff6cbc3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbc3000 LB 0x1000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cbc4000-00007fff6cbc9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cfgmgr32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbc4000 LB 0x6000 (base 00007fff6cb80000) - 'cfgmgr32.dll' 3204.4414: 00007fff6cbca000-00007fff6cbcffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6cbd0000-00007fff6cbd0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbd0000 LB 0x1000 (base 00007fff6cbd0000) - 'bcryptprimitives.dll' 3204.4414: 00007fff6cbd1000-00007fff6cc36fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cbd1000 LB 0x66000 (base 00007fff6cbd0000) - 'bcryptprimitives.dll' 3204.4414: 00007fff6cc37000-00007fff6cc49fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cc37000 LB 0x13000 (base 00007fff6cbd0000) - 'bcryptprimitives.dll' 3204.4414: 00007fff6cc4a000-00007fff6cc4afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cc4a000 LB 0x1000 (base 00007fff6cbd0000) - 'bcryptprimitives.dll' 3204.4414: 00007fff6cc4b000-00007fff6cc4ffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6cc4b000 LB 0x5000 (base 00007fff6cbd0000) - 'bcryptprimitives.dll' 3204.4414: 00007fff6cc50000-00007fff6ccaffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ccb0000-00007fff6ccb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccb0000 LB 0x1000 (base 00007fff6ccb0000) - 'cryptsp.dll' 3204.4414: 00007fff6ccb1000-00007fff6ccbbfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccb1000 LB 0xb000 (base 00007fff6ccb0000) - 'cryptsp.dll' 3204.4414: 00007fff6ccbc000-00007fff6ccc1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccbc000 LB 0x6000 (base 00007fff6ccb0000) - 'cryptsp.dll' 3204.4414: 00007fff6ccc2000-00007fff6ccc2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccc2000 LB 0x1000 (base 00007fff6ccb0000) - 'cryptsp.dll' 3204.4414: 00007fff6ccc3000-00007fff6ccc6fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccc3000 LB 0x4000 (base 00007fff6ccb0000) - 'cryptsp.dll' 3204.4414: 00007fff6ccc7000-00007fff6cccffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ccd0000-00007fff6ccd0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccd0000 LB 0x1000 (base 00007fff6ccd0000) - 'bcrypt.dll' 3204.4414: 00007fff6ccd1000-00007fff6cce9fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccd1000 LB 0x19000 (base 00007fff6ccd0000) - 'bcrypt.dll' 3204.4414: 00007fff6ccea000-00007fff6cceffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccea000 LB 0x6000 (base 00007fff6ccd0000) - 'bcrypt.dll' 3204.4414: 00007fff6ccf0000-00007fff6ccf0fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccf0000 LB 0x1000 (base 00007fff6ccd0000) - 'bcrypt.dll' 3204.4414: 00007fff6ccf1000-00007fff6ccf5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ccf1000 LB 0x5000 (base 00007fff6ccd0000) - 'bcrypt.dll' 3204.4414: 00007fff6ccf6000-00007fff6ce4ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ce50000-00007fff6ce50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ce50000 LB 0x1000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6ce51000-00007fff6d396fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ce51000 LB 0x546000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6d397000-00007fff6d553fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d397000 LB 0x1bd000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6d554000-00007fff6d560fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d554000 LB 0xd000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6d561000-00007fff6d561fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d561000 LB 0x1000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6d562000-00007fff6d5d1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\windows.storage.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d562000 LB 0x70000 (base 00007fff6ce50000) - 'windows.storage.dll' 3204.4414: 00007fff6d5d2000-00007fff6d5dffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6d5e0000-00007fff6d5e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d5e0000 LB 0x1000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d5e1000-00007fff6d6b2fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d5e1000 LB 0xd2000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d6b3000-00007fff6d753fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d6b3000 LB 0xa1000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d754000-00007fff6d757fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d754000 LB 0x4000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d758000-00007fff6d758fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d758000 LB 0x1000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d759000-00007fff6d775fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32full.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d759000 LB 0x1d000 (base 00007fff6d5e0000) - 'gdi32full.dll' 3204.4414: 00007fff6d776000-00007fff6d77ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6d780000-00007fff6d780fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d780000 LB 0x1000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d781000-00007fff6d7d4fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d781000 LB 0x54000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d7d5000-00007fff6d811fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d7d5000 LB 0x3d000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d812000-00007fff6d812fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d812000 LB 0x1000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d813000-00007fff6d815fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d813000 LB 0x3000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d816000-00007fff6d81dfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcp_win.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d816000 LB 0x8000 (base 00007fff6d780000) - 'msvcp_win.dll' 3204.4414: 00007fff6d81e000-00007fff6d83ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6d840000-00007fff6d840fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\setupapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d840000 LB 0x1000 (base 00007fff6d840000) - 'setupapi.dll' 3204.4414: 00007fff6d841000-00007fff6d918fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\setupapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d841000 LB 0xd8000 (base 00007fff6d840000) - 'setupapi.dll' 3204.4414: 00007fff6d919000-00007fff6d953fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\setupapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d919000 LB 0x3b000 (base 00007fff6d840000) - 'setupapi.dll' 3204.4414: 00007fff6d954000-00007fff6d955fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\setupapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d954000 LB 0x2000 (base 00007fff6d840000) - 'setupapi.dll' 3204.4414: 00007fff6d956000-00007fff6dcaffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\setupapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6d956000 LB 0x35a000 (base 00007fff6d840000) - 'setupapi.dll' 3204.4414: 00007fff6dcb0000-00007fff6dd9ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6dda0000-00007fff6dda0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6dda0000 LB 0x1000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6dda1000-00007fff6ddfffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6dda1000 LB 0x5f000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de00000-00007fff6de34fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de00000 LB 0x35000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de35000-00007fff6de35fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de35000 LB 0x1000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de36000-00007fff6de36fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de36000 LB 0x1000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de37000-00007fff6de38fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de37000 LB 0x2000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de39000-00007fff6de39fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de39000 LB 0x1000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de3a000-00007fff6de42fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\advapi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6de3a000 LB 0x9000 (base 00007fff6dda0000) - 'advapi32.dll' 3204.4414: 00007fff6de43000-00007fff6e10ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e110000-00007fff6e110fff 0x0040/0x0040 0x0020000 !! 3204.4414: 00007fff6e111000-00007fff6e11ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e120000-00007fff6e120fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e120000 LB 0x1000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e121000-00007fff6e195fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e121000 LB 0x75000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e196000-00007fff6e1aefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e196000 LB 0x19000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1af000-00007fff6e1b0fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1af000 LB 0x2000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1b1000-00007fff6e1b3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1b1000 LB 0x3000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1b4000-00007fff6e1b5fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1b4000 LB 0x2000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1b6000-00007fff6e1b6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1b6000 LB 0x1000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1b7000-00007fff6e1bdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1b7000 LB 0x7000 (base 00007fff6e120000) - 'msvcrt.dll' 3204.4414: 00007fff6e1be000-00007fff6e1bffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e1c0000-00007fff6e1c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\SHCore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1c0000 LB 0x1000 (base 00007fff6e1c0000) - 'SHCore.dll' 3204.4414: 00007fff6e1c1000-00007fff6e231fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\SHCore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e1c1000 LB 0x71000 (base 00007fff6e1c0000) - 'SHCore.dll' 3204.4414: 00007fff6e232000-00007fff6e257fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\SHCore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e232000 LB 0x26000 (base 00007fff6e1c0000) - 'SHCore.dll' 3204.4414: 00007fff6e258000-00007fff6e259fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\SHCore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e258000 LB 0x2000 (base 00007fff6e1c0000) - 'SHCore.dll' 3204.4414: 00007fff6e25a000-00007fff6e268fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\SHCore.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e25a000 LB 0xf000 (base 00007fff6e1c0000) - 'SHCore.dll' 3204.4414: 00007fff6e269000-00007fff6e26ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e270000-00007fff6e270fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\combase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e270000 LB 0x1000 (base 00007fff6e270000) - 'combase.dll' 3204.4414: 00007fff6e271000-00007fff6e48efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\combase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e271000 LB 0x21e000 (base 00007fff6e270000) - 'combase.dll' 3204.4414: 00007fff6e48f000-00007fff6e551fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\combase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e48f000 LB 0xc3000 (base 00007fff6e270000) - 'combase.dll' 3204.4414: 00007fff6e552000-00007fff6e557fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\combase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e552000 LB 0x6000 (base 00007fff6e270000) - 'combase.dll' 3204.4414: 00007fff6e558000-00007fff6e5a4fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\combase.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e558000 LB 0x4d000 (base 00007fff6e270000) - 'combase.dll' 3204.4414: 00007fff6e5a5000-00007fff6e5affff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e5b0000-00007fff6e5b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5b0000 LB 0x1000 (base 00007fff6e5b0000) - 'gdi32.dll' 3204.4414: 00007fff6e5b1000-00007fff6e5bcfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5b1000 LB 0xc000 (base 00007fff6e5b0000) - 'gdi32.dll' 3204.4414: 00007fff6e5bd000-00007fff6e5cffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5bd000 LB 0x13000 (base 00007fff6e5b0000) - 'gdi32.dll' 3204.4414: 00007fff6e5d0000-00007fff6e5d0fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5d0000 LB 0x1000 (base 00007fff6e5b0000) - 'gdi32.dll' 3204.4414: 00007fff6e5d1000-00007fff6e5d5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\gdi32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5d1000 LB 0x5000 (base 00007fff6e5b0000) - 'gdi32.dll' 3204.4414: 00007fff6e5d6000-00007fff6e5dffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e5e0000-00007fff6e5e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ws2_32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5e0000 LB 0x1000 (base 00007fff6e5e0000) - 'ws2_32.dll' 3204.4414: 00007fff6e5e1000-00007fff6e627fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ws2_32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e5e1000 LB 0x47000 (base 00007fff6e5e0000) - 'ws2_32.dll' 3204.4414: 00007fff6e628000-00007fff6e635fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ws2_32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e628000 LB 0xe000 (base 00007fff6e5e0000) - 'ws2_32.dll' 3204.4414: 00007fff6e636000-00007fff6e636fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ws2_32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e636000 LB 0x1000 (base 00007fff6e5e0000) - 'ws2_32.dll' 3204.4414: 00007fff6e637000-00007fff6e64efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ws2_32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e637000 LB 0x18000 (base 00007fff6e5e0000) - 'ws2_32.dll' 3204.4414: 00007fff6e64f000-00007fff6e64ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e650000-00007fff6e650fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shlwapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e650000 LB 0x1000 (base 00007fff6e650000) - 'shlwapi.dll' 3204.4414: 00007fff6e651000-00007fff6e67afff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shlwapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e651000 LB 0x2a000 (base 00007fff6e650000) - 'shlwapi.dll' 3204.4414: 00007fff6e67b000-00007fff6e69afff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shlwapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e67b000 LB 0x20000 (base 00007fff6e650000) - 'shlwapi.dll' 3204.4414: 00007fff6e69b000-00007fff6e69bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shlwapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e69b000 LB 0x1000 (base 00007fff6e650000) - 'shlwapi.dll' 3204.4414: 00007fff6e69c000-00007fff6e6a1fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shlwapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6e69c000 LB 0x6000 (base 00007fff6e650000) - 'shlwapi.dll' 3204.4414: 00007fff6e6a2000-00007fff6e6affff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6e6b0000-00007fff6e6b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\user32.dll 3204.4414: 00007fff6e6b1000-00007fff6e736fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\user32.dll 3204.4414: 00007fff6e737000-00007fff6e756fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\user32.dll 3204.4414: 00007fff6e757000-00007fff6e758fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\user32.dll 3204.4414: 00007fff6e759000-00007fff6e843fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\user32.dll 3204.4414: 00007fff6e844000-00007fff6e9fffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ea00000-00007fff6ea00fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\psapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea00000 LB 0x1000 (base 00007fff6ea00000) - 'psapi.dll' 3204.4414: 00007fff6ea01000-00007fff6ea01fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\psapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea01000 LB 0x1000 (base 00007fff6ea00000) - 'psapi.dll' 3204.4414: 00007fff6ea02000-00007fff6ea03fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\psapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea02000 LB 0x2000 (base 00007fff6ea00000) - 'psapi.dll' 3204.4414: 00007fff6ea04000-00007fff6ea04fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\psapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea04000 LB 0x1000 (base 00007fff6ea00000) - 'psapi.dll' 3204.4414: 00007fff6ea05000-00007fff6ea07fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\psapi.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea05000 LB 0x3000 (base 00007fff6ea00000) - 'psapi.dll' 3204.4414: 00007fff6ea08000-00007fff6ea0ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ea10000-00007fff6ea10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ole32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea10000 LB 0x1000 (base 00007fff6ea10000) - 'ole32.dll' 3204.4414: 00007fff6ea11000-00007fff6eadafff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ole32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ea11000 LB 0xca000 (base 00007fff6ea10000) - 'ole32.dll' 3204.4414: 00007fff6eadb000-00007fff6eb37fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ole32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6eadb000 LB 0x5d000 (base 00007fff6ea10000) - 'ole32.dll' 3204.4414: 00007fff6eb38000-00007fff6eb39fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ole32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6eb38000 LB 0x2000 (base 00007fff6ea10000) - 'ole32.dll' 3204.4414: 00007fff6eb3a000-00007fff6eb66fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ole32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6eb3a000 LB 0x2d000 (base 00007fff6ea10000) - 'ole32.dll' 3204.4414: 00007fff6eb67000-00007fff6eb6ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6eb70000-00007fff6eb70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6eb71000-00007fff6ebe5fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6ebe6000-00007fff6ec17fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6ec18000-00007fff6ec18fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6ec19000-00007fff6ec19fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6ec1a000-00007fff6ec21fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 3204.4414: 00007fff6ec22000-00007fff6ecaffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6ecb0000-00007fff6ecb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ecb0000 LB 0x1000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6ecb1000-00007fff6f20dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6ecb1000 LB 0x55d000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6f20e000-00007fff6f327fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f20e000 LB 0x11a000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6f328000-00007fff6f32efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f328000 LB 0x7000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6f32f000-00007fff6f330fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f32f000 LB 0x2000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6f331000-00007fff6f395fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\shell32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f331000 LB 0x65000 (base 00007fff6ecb0000) - 'shell32.dll' 3204.4414: 00007fff6f396000-00007fff6f39ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6f3a0000-00007fff6f3a0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f3a0000 LB 0x1000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f3a1000-00007fff6f401fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f3a1000 LB 0x61000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f402000-00007fff6f428fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f402000 LB 0x27000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f429000-00007fff6f429fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f429000 LB 0x1000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f42a000-00007fff6f42afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f42a000 LB 0x1000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f42b000-00007fff6f42cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f42b000 LB 0x2000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f42d000-00007fff6f436fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\sechost.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f42d000 LB 0xa000 (base 00007fff6f3a0000) - 'sechost.dll' 3204.4414: 00007fff6f437000-00007fff6f44ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6f450000-00007fff6f450fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f450000 LB 0x1000 (base 00007fff6f450000) - 'rpcrt4.dll' 3204.4414: 00007fff6f451000-00007fff6f52dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f451000 LB 0xdd000 (base 00007fff6f450000) - 'rpcrt4.dll' 3204.4414: 00007fff6f52e000-00007fff6f558fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f52e000 LB 0x2b000 (base 00007fff6f450000) - 'rpcrt4.dll' 3204.4414: 00007fff6f559000-00007fff6f55afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f559000 LB 0x2000 (base 00007fff6f450000) - 'rpcrt4.dll' 3204.4414: 00007fff6f55b000-00007fff6f56ffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f55b000 LB 0x15000 (base 00007fff6f450000) - 'rpcrt4.dll' 3204.4414: *00007fff6f570000-00007fff6f570fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\oleaut32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f570000 LB 0x1000 (base 00007fff6f570000) - 'oleaut32.dll' 3204.4414: 00007fff6f571000-00007fff6f5fdfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\oleaut32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f571000 LB 0x8d000 (base 00007fff6f570000) - 'oleaut32.dll' 3204.4414: 00007fff6f5fe000-00007fff6f623fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\oleaut32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f5fe000 LB 0x26000 (base 00007fff6f570000) - 'oleaut32.dll' 3204.4414: 00007fff6f624000-00007fff6f626fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\oleaut32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f624000 LB 0x3000 (base 00007fff6f570000) - 'oleaut32.dll' 3204.4414: 00007fff6f627000-00007fff6f634fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\oleaut32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f627000 LB 0xe000 (base 00007fff6f570000) - 'oleaut32.dll' 3204.4414: 00007fff6f635000-00007fff6f69ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6f6a0000-00007fff6f6a0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\imm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f6a0000 LB 0x1000 (base 00007fff6f6a0000) - 'imm32.dll' 3204.4414: 00007fff6f6a1000-00007fff6f6bcfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\imm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f6a1000 LB 0x1c000 (base 00007fff6f6a0000) - 'imm32.dll' 3204.4414: 00007fff6f6bd000-00007fff6f6c3fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\imm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f6bd000 LB 0x7000 (base 00007fff6f6a0000) - 'imm32.dll' 3204.4414: 00007fff6f6c4000-00007fff6f6c4fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\imm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f6c4000 LB 0x1000 (base 00007fff6f6a0000) - 'imm32.dll' 3204.4414: 00007fff6f6c5000-00007fff6f6cdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\imm32.dll 3204.4414: supHardNtVpScanVirtualMemory: Ignoring unknown mem at 00007fff6f6c5000 LB 0x9000 (base 00007fff6f6a0000) - 'imm32.dll' 3204.4414: 00007fff6f6ce000-00007fff6f78ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6f790000-00007fff6f790fff 0x0040/0x0040 0x0020000 !! 3204.4414: 00007fff6f791000-00007fff6f79ffff 0x0001/0x0000 0x0000000 3204.4414: *00007fff6f7a0000-00007fff6f7a0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f7a1000-00007fff6f8b7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f8b8000-00007fff6f8fefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f8ff000-00007fff6f8fffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f900000-00007fff6f901fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f902000-00007fff6f90afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f90b000-00007fff6f98ffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 3204.4414: 00007fff6f990000-00007ffffffeffff 0x0001/0x0000 0x0000000 3204.4414: kernel32.dll: timestamp 0xce6bbd73 (rc=VINF_SUCCESS) 3204.4414: user32.dll: timestamp 0xee4ef0d0 (rc=VINF_SUCCESS) 3204.4414: kernelbase.dll: timestamp 0x7b90c1b5 (rc=VINF_SUCCESS) 3204.4414: VBoxHeadless.exe: timestamp 0x5f08d7bc (rc=VINF_SUCCESS) 3204.4414: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe' has no imports 3204.4414: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports 3204.4414: ntdll.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6f80a880 / 0x006a880: 40 != e9 3204.4414: 00007fff6f80a881 / 0x006a881: 53 != 4f 3204.4414: 00007fff6f80a882 / 0x006a882: 48 != 67 3204.4414: 00007fff6f80a883 / 0x006a883: 83 != f8 3204.4414: 00007fff6f80a884 / 0x006a884: ec != ff 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6f809000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb865d0 / 0x00165d0: 48 != e9 3204.4414: 00007fff6eb865d1 / 0x00165d1: ff != 72 3204.4414: 00007fff6eb865d2 / 0x00165d2: 25 != a3 3204.4414: 00007fff6eb865d3 / 0x00165d3: f9 != c0 3204.4414: 00007fff6eb865d4 / 0x00165d4: 17 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb85000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb8a1b0 / 0x001a1b0: 48 != e9 3204.4414: 00007fff6eb8a1b1 / 0x001a1b1: ff != 92 3204.4414: 00007fff6eb8a1b2 / 0x001a1b2: 25 != 6c 3204.4414: 00007fff6eb8a1b3 / 0x001a1b3: 99 != c0 3204.4414: 00007fff6eb8a1b4 / 0x001a1b4: dc != 00 3204.4414: 00007fff6eb8ab30 / 0x001ab30: 4c != e9 3204.4414: 00007fff6eb8ab31 / 0x001ab31: 8b != e0 3204.4414: 00007fff6eb8ab32 / 0x001ab32: dc != 5d 3204.4414: 00007fff6eb8ab33 / 0x001ab33: 49 != c0 3204.4414: 00007fff6eb8ab34 / 0x001ab34: 89 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb89000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb8bd00 / 0x001bd00: 48 != e9 3204.4414: 00007fff6eb8bd01 / 0x001bd01: ff != 02 3204.4414: 00007fff6eb8bd02 / 0x001bd02: 25 != 51 3204.4414: 00007fff6eb8bd03 / 0x001bd03: 59 != c0 3204.4414: 00007fff6eb8bd04 / 0x001bd04: c1 != 00 3204.4414: 00007fff6eb8be40 / 0x001be40: 4c != e9 3204.4414: 00007fff6eb8be41 / 0x001be41: 8b != 10 3204.4414: 00007fff6eb8be42 / 0x001be42: dc != 51 3204.4414: 00007fff6eb8be43 / 0x001be43: 48 != c0 3204.4414: 00007fff6eb8be44 / 0x001be44: 83 != 00 3204.4414: 00007fff6eb8c250 / 0x001c250: 48 != e9 3204.4414: 00007fff6eb8c251 / 0x001c251: ff != 72 3204.4414: 00007fff6eb8c252 / 0x001c252: 25 != 46 3204.4414: 00007fff6eb8c253 / 0x001c253: 91 != c0 3204.4414: 00007fff6eb8c254 / 0x001c254: bf != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb8b000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb8e4f0 / 0x001e4f0: 48 != e9 3204.4414: 00007fff6eb8e4f1 / 0x001e4f1: ff != d2 3204.4414: 00007fff6eb8e4f2 / 0x001e4f2: 25 != 29 3204.4414: 00007fff6eb8e4f3 / 0x001e4f3: f9 != c0 3204.4414: 00007fff6eb8e4f4 / 0x001e4f4: 99 != 00 3204.4414: 00007fff6eb8e500 / 0x001e500: 48 != e9 3204.4414: 00007fff6eb8e501 / 0x001e501: ff != 82 3204.4414: 00007fff6eb8e502 / 0x001e502: 25 != 29 3204.4414: 00007fff6eb8e503 / 0x001e503: 41 != c0 3204.4414: 00007fff6eb8e504 / 0x001e504: 99 != 00 3204.4414: 00007fff6eb8ea20 / 0x001ea20: 48 != e9 3204.4414: 00007fff6eb8ea21 / 0x001ea21: ff != e2 3204.4414: 00007fff6eb8ea22 / 0x001ea22: 25 != 21 3204.4414: 00007fff6eb8ea23 / 0x001ea23: 81 != c0 3204.4414: 00007fff6eb8ea24 / 0x001ea24: 92 != 00 3204.4414: 00007fff6eb8eb60 / 0x001eb60: 48 != e9 3204.4414: 00007fff6eb8eb61 / 0x001eb61: ff != a2 3204.4414: 00007fff6eb8eb62 / 0x001eb62: 25 != 23 3204.4414: 00007fff6eb8eb63 / 0x001eb63: 91 != c0 3204.4414: 00007fff6eb8eb64 / 0x001eb64: 93 != 00 3204.4414: 00007fff6eb8ee00 / 0x001ee00: 48 != e9 3204.4414: 00007fff6eb8ee01 / 0x001ee01: 83 != d3 3204.4414: 00007fff6eb8ee02 / 0x001ee02: ec != 1f 3204.4414: 00007fff6eb8ee03 / 0x001ee03: 28 != c0 3204.4414: 00007fff6eb8ee04 / 0x001ee04: ff != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb8d000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb8f0a0 / 0x001f0a0: 48 != e9 3204.4414: 00007fff6eb8f0a1 / 0x001f0a1: 83 != f0 3204.4414: 00007fff6eb8f0a2 / 0x001f0a2: ec != 1a 3204.4414: 00007fff6eb8f0a3 / 0x001f0a3: 38 != c0 3204.4414: 00007fff6eb8f0a4 / 0x001f0a4: 45 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb8f000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eb911b0 / 0x00211b0: 48 != e9 3204.4414: 00007fff6eb911b1 / 0x00211b1: ff != 52 3204.4414: 00007fff6eb911b2 / 0x00211b2: 25 != f9 3204.4414: 00007fff6eb911b3 / 0x00211b3: e1 != bf 3204.4414: 00007fff6eb911b4 / 0x00211b4: 6a != 00 3204.4414: 00007fff6eb91550 / 0x0021550: 48 != e9 3204.4414: 00007fff6eb91551 / 0x0021551: ff != 72 3204.4414: 00007fff6eb91552 / 0x0021552: 25 != f2 3204.4414: 00007fff6eb91553 / 0x0021553: 19 != bf 3204.4414: 00007fff6eb91554 / 0x0021554: 67 != 00 3204.4414: 00007fff6eb91e10 / 0x0021e10: ff != e9 3204.4414: 00007fff6eb91e11 / 0x0021e11: 25 != f1 3204.4414: 00007fff6eb91e12 / 0x0021e12: fa != ee 3204.4414: 00007fff6eb91e13 / 0x0021e13: 5e != bf 3204.4414: 00007fff6eb91e14 / 0x0021e14: 05 != 00 3204.4414: 00007fff6eb92080 / 0x0022080: ff != e9 3204.4414: 00007fff6eb92081 / 0x0022081: 25 != 01 3204.4414: 00007fff6eb92082 / 0x0022082: 9a != ed 3204.4414: 00007fff6eb92083 / 0x0022083: 59 != bf 3204.4414: 00007fff6eb92084 / 0x0022084: 05 != 00 3204.4414: 00007fff6eb92090 / 0x0022090: ff != e9 3204.4414: 00007fff6eb92091 / 0x0022091: 25 != b1 3204.4414: 00007fff6eb92092 / 0x0022092: 82 != ec 3204.4414: 00007fff6eb92093 / 0x0022093: 59 != bf 3204.4414: 00007fff6eb92094 / 0x0022094: 05 != 00 3204.4414: 00007fff6eb920b0 / 0x00220b0: ff != e9 3204.4414: 00007fff6eb920b1 / 0x00220b1: 25 != d1 3204.4414: 00007fff6eb920b2 / 0x00220b2: d2 != e6 3204.4414: 00007fff6eb920b3 / 0x00220b3: 59 != bf 3204.4414: 00007fff6eb920b4 / 0x00220b4: 05 != 00 3204.4414: 00007fff6eb920c0 / 0x00220c0: ff != e9 3204.4414: 00007fff6eb920c1 / 0x00220c1: 25 != 81 3204.4414: 00007fff6eb920c2 / 0x00220c2: 3a != e6 3204.4414: 00007fff6eb920c3 / 0x00220c3: 59 != bf 3204.4414: 00007fff6eb920c4 / 0x00220c4: 05 != 00 3204.4414: 00007fff6eb92410 / 0x0022410: ff != e9 3204.4414: 00007fff6eb92411 / 0x0022411: 25 != f1 3204.4414: 00007fff6eb92412 / 0x0022412: 5a != e5 3204.4414: 00007fff6eb92413 / 0x0022413: 57 != bf 3204.4414: 00007fff6eb92414 / 0x0022414: 05 != 00 3204.4414: 00007fff6eb92420 / 0x0022420: ff != e9 3204.4414: 00007fff6eb92421 / 0x0022421: 25 != a1 3204.4414: 00007fff6eb92422 / 0x0022422: 52 != e5 3204.4414: 00007fff6eb92423 / 0x0022423: 57 != bf 3204.4414: 00007fff6eb92424 / 0x0022424: 05 != 00 3204.4414: 00007fff6eb92500 / 0x0022500: ff != e9 3204.4414: 00007fff6eb92501 / 0x0022501: 25 != 41 3204.4414: 00007fff6eb92502 / 0x0022502: b2 != e5 3204.4414: 00007fff6eb92503 / 0x0022503: 56 != bf 3204.4414: 00007fff6eb92504 / 0x0022504: 05 != 00 3204.4414: 00007fff6eb92510 / 0x0022510: ff != e9 3204.4414: 00007fff6eb92511 / 0x0022511: 25 != 71 3204.4414: 00007fff6eb92512 / 0x0022512: aa != e4 3204.4414: 00007fff6eb92513 / 0x0022513: 56 != bf 3204.4414: 00007fff6eb92514 / 0x0022514: 05 != 00 3204.4414: 00007fff6eb92700 / 0x0022700: ff != e9 3204.4414: 00007fff6eb92701 / 0x0022701: 25 != 81 3204.4414: 00007fff6eb92702 / 0x0022702: d2 != e5 3204.4414: 00007fff6eb92703 / 0x0022703: 55 != bf 3204.4414: 00007fff6eb92704 / 0x0022704: 05 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eb91000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6eba57f0 / 0x00357f0: 48 != e9 3204.4414: 00007fff6eba57f1 / 0x00357f1: ff != 12 3204.4414: 00007fff6eba57f2 / 0x00357f2: 25 != b0 3204.4414: 00007fff6eba57f3 / 0x00357f3: d9 != be 3204.4414: 00007fff6eba57f4 / 0x00357f4: 24 != 00 3204.4414: 00007fff6eba58f0 / 0x00358f0: 4c != e9 3204.4414: 00007fff6eba58f1 / 0x00358f1: 8b != a0 3204.4414: 00007fff6eba58f2 / 0x00358f2: dc != b6 3204.4414: 00007fff6eba58f3 / 0x00358f3: 48 != be 3204.4414: 00007fff6eba58f4 / 0x00358f4: 83 != 00 3204.4414: 00007fff6eba6200 / 0x0036200: 48 != e9 3204.4414: 00007fff6eba6201 / 0x0036201: ff != 82 3204.4414: 00007fff6eba6202 / 0x0036202: 25 != a8 3204.4414: 00007fff6eba6203 / 0x0036203: 89 != be 3204.4414: 00007fff6eba6204 / 0x0036204: 1a != 00 3204.4414: 00007fff6eba6850 / 0x0036850: 48 != e9 3204.4414: 00007fff6eba6851 / 0x0036851: ff != f2 3204.4414: 00007fff6eba6852 / 0x0036852: 25 != 9f 3204.4414: 00007fff6eba6853 / 0x0036853: 49 != be 3204.4414: 00007fff6eba6854 / 0x0036854: 14 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6eba5000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6ebc9e10 / 0x0059e10: 48 != e9 3204.4414: 00007fff6ebc9e11 / 0x0059e11: 89 != be 3204.4414: 00007fff6ebc9e12 / 0x0059e12: 5c != 6e 3204.4414: 00007fff6ebc9e13 / 0x0059e13: 24 != bc 3204.4414: 00007fff6ebc9e14 / 0x0059e14: 08 != 00 3204.4414: 00007fff6ebc9ea0 / 0x0059ea0: 48 != e9 3204.4414: 00007fff6ebc9ea1 / 0x0059ea1: 8b != b0 3204.4414: 00007fff6ebc9ea2 / 0x0059ea2: c4 != 6d 3204.4414: 00007fff6ebc9ea3 / 0x0059ea3: 48 != bc 3204.4414: 00007fff6ebc9ea4 / 0x0059ea4: 89 != 00 3204.4414: 00007fff6ebca840 / 0x005a840: 48 != e9 3204.4414: 00007fff6ebca841 / 0x005a841: 8b != 50 3204.4414: 00007fff6ebca842 / 0x005a842: c4 != 60 3204.4414: 00007fff6ebca843 / 0x005a843: 48 != bc 3204.4414: 00007fff6ebca844 / 0x005a844: 89 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6ebc9000 3204.4414: kernel32.dll: Differences in section #1 (.text) between file and memory: 3204.4414: 00007fff6ebcb5f0 / 0x005b5f0: 48 != e9 3204.4414: 00007fff6ebcb5f1 / 0x005b5f1: 83 != e3 3204.4414: 00007fff6ebcb5f2 / 0x005b5f2: ec != 55 3204.4414: 00007fff6ebcb5f3 / 0x005b5f3: 38 != bc 3204.4414: 00007fff6ebcb5f4 / 0x005b5f4: 48 != 00 3204.4414: 00007fff6ebcb620 / 0x005b620: 48 != e9 3204.4414: 00007fff6ebcb621 / 0x005b621: 83 != 33 3204.4414: 00007fff6ebcb622 / 0x005b622: ec != 55 3204.4414: 00007fff6ebcb623 / 0x005b623: 38 != bc 3204.4414: 00007fff6ebcb624 / 0x005b624: 48 != 00 3204.4414: 00007fff6ebcb720 / 0x005b720: 48 != e9 3204.4414: 00007fff6ebcb721 / 0x005b721: 83 != b3 3204.4414: 00007fff6ebcb722 / 0x005b722: ec != 53 3204.4414: 00007fff6ebcb723 / 0x005b723: 38 != bc 3204.4414: 00007fff6ebcb724 / 0x005b724: 48 != 00 3204.4414: Restored 0x2000 bytes of original file content at 00007fff6ebcb000 3204.4414: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'win32u.dll'. 3204.4414: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #34 'gdi32.dll'. 3204.4414: supHardNtVpGetImport: Failed to find symbol 0xffffffff / 'NtUserRegisterClassExWOW' in 'win32u.dll': Unknown Status -610 (0xfffffd9e) 3204.4414: Error (rc=-5629): 3204.4414: RTLdrGetBits failed on image user32.dll: Unknown Status -610 (0xfffffd9e) 3204.4414: supR3HardenedWinInit: SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED -> Unknown Status -5629 (0xffffea03), cFixes=10 3204.4414: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe' has no imports 3204.4414: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe) 3204.4414: supR3HardNtEnableThreadCreationEx: 3204.4414: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007fff6f811770 pvNtTerminateThread=00007fff6f83cac0 3204.4414: supR3HardenedWinDoReSpawn(1): New child 2b28.a14 [kernel32]. 3204.4414: supR3HardNtChildGatherData: PebBaseAddress=0000000000a54000 cbPeb=0x388 3204.4414: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007fff6f7a0000 uNtDllChildAddr=00007fff6f7a0000 3204.4414: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007fff6f811770 3204.4414: supR3HardenedWinSetupChildInit: Initial context: rax=0000000000000000 rbx=0000000000000000 rcx=00007ff62c2f7740 rdx=0000000000a54000 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000 rip=00007fff6f80ce30 rsp=00000000009bffb8 rbp=0000000000000000 ctxflags=0010001b cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000 3204.4414: supR3HardenedWinSetupChildInit: Start child. 3204.4414: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 1 ms. 3204.4414: supR3HardNtChildPurify: Startup delay kludge #1/0: 517 ms, 58 sleeps 3204.4414: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 3204.4414: *0000000000000000-000000000087ffff 0x0001/0x0000 0x0000000 3204.4414: *0000000000880000-000000000089ffff 0x0004/0x0004 0x0020000 3204.4414: *00000000008a0000-00000000008bafff 0x0002/0x0002 0x0040000 3204.4414: 00000000008bb000-00000000008bffff 0x0001/0x0000 0x0000000 3204.4414: *00000000008c0000-00000000009bafff 0x0000/0x0004 0x0020000 3204.4414: 00000000009bb000-00000000009bdfff 0x0104/0x0004 0x0020000 3204.4414: 00000000009be000-00000000009bffff 0x0004/0x0004 0x0020000 3204.4414: *00000000009c0000-00000000009c0fff 0x0020/0x0020 0x0020000 !! 3204.4414: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 00000000009c0000 (LB 0x1000, 00000000009c0000 LB 0x1000) 3204.4414: 0000000004745b80/0000: 52 74 6c 43 72 65 61 74-65 55 73 65 72 54 68 72 RtlCreateUserThr 0000000004745b90/0010: 65 61 64 00 00 00 00 00-52 74 6c 45 78 69 74 55 ead.....RtlExitU 0000000004745ba0/0020: 73 65 72 54 68 72 65 61-64 00 00 00 00 00 00 00 serThread....... 0000000004745bb0/0030: 4e 74 44 65 6c 61 79 45-78 65 63 75 74 69 6f 6e NtDelayExecution 0000000004745bc0/0040: 00 00 00 00 00 00 00 00-4e 74 43 72 65 61 74 65 ........NtCreate 0000000004745bd0/0050: 46 69 6c 65 00 00 00 00-4e 74 44 65 76 69 63 65 File....NtDevice 0000000004745be0/0060: 49 6f 43 6f 6e 74 72 6f-6c 46 69 6c 65 00 00 00 IoControlFile... 0000000004745bf0/0070: 4e 74 43 6c 6f 73 65 00-5c 00 44 00 65 00 76 00 NtClose.\.D.e.v. 0000000004745c00/0080: 69 00 63 00 65 00 5c 00-53 00 6f 00 6c 00 61 00 i.c.e.\.S.o.l.a. 0000000004745c10/0090: 72 00 44 00 72 00 69 00-76 00 65 00 72 00 4c 00 r.D.r.i.v.e.r.L. 0000000004745c20/00a0: 6f 00 67 00 00 00 00 00-48 89 5c 24 18 48 89 74 o.g.....H.\$.H.t 0000000004745c30/00b0: 24 20 55 57 41 54 41 56-41 57 48 8b ec 48 83 ec $ UWATAVAWH..H.. 0000000004745c40/00c0: 30 48 8b 79 08 48 8d 15-64 ff ff ff 4c 8b 31 48 0H.y.H..d...L.1H 0000000004745c50/00d0: 8b f1 48 8b cf e8 3a 03-00 00 48 8d 5e 18 45 33 ..H...:...H.^.E3 0000000004745c60/00e0: e4 4c 8b f8 66 44 39 23-0f 84 92 00 00 00 bf 18 .L..fD9#........ 0000000004745c70/00f0: 00 00 c0 41 0f b7 cc 66-44 89 65 f2 66 89 4d f0 ...A...fD.e.f.M. 3204.4414: 0000000004745c80/0000: 48 89 5d f8 66 44 39 23-74 11 66 ff c1 0f b7 c1 H.].fD9#t.f..... 0000000004745c90/0010: 66 89 4d f0 66 44 39 24-43 75 ef 66 03 c9 66 89 f.M.fD9$Cu.f..f. 0000000004745ca0/0020: 4d f0 66 89 4d f2 eb 11-48 8d 55 30 48 c7 45 30 M.f.M...H.U0H.E0 0000000004745cb0/0030: c0 bd f0 ff 33 c9 41 ff-d7 4c 8d 4d 38 33 d2 4c ....3.A..L.M83.L 0000000004745cc0/0040: 8d 45 f0 33 c9 41 ff d6-3b c7 74 dc 85 c0 74 13 .E.3.A..;.t...t. 0000000004745cd0/0050: 44 0f b7 4d f0 8b d0 4c-8b 45 f8 48 8b ce e8 51 D..M...L.E.H...Q 0000000004745ce0/0060: 00 00 00 0f b7 45 f0 48-d1 e8 48 8d 1c 43 48 83 .....E.H..H..CH. 0000000004745cf0/0070: c3 02 66 44 39 23 0f 85-77 ff ff ff 48 8b 7e 08 ..fD9#..w...H.~. 0000000004745d00/0080: 48 8d 15 91 fe ff ff 48-8b cf e8 85 02 00 00 33 H......H.......3 0000000004745d10/0090: c9 ff d0 48 8b 5c 24 70-33 c0 48 8b 74 24 78 48 ...H.\$p3.H.t$xH 0000000004745d20/00a0: 83 c4 30 41 5f 41 5e 41-5c 5f 5d c3 cc cc cc cc ..0A_A^A\_]..... 0000000004745d30/00b0: cc cc cc cc 48 89 5c 24-10 48 89 74 24 18 55 57 ....H.\$.H.t$.UW 0000000004745d40/00c0: 41 54 41 56 41 57 48 8d-6c 24 c9 48 81 ec d0 00 ATAVAWH.l$.H.... 0000000004745d50/00d0: 00 00 44 8b fa 48 8b f9-48 8b 49 08 48 8d 15 65 ..D..H..H.I.H..e 0000000004745d60/00e0: fe ff ff 41 8b f1 4d 8b-f0 e8 26 02 00 00 48 8b ...A..M...&...H. 0000000004745d70/00f0: 4f 08 48 8d 15 5f fe ff-ff 48 8b d8 e8 13 02 00 O.H.._...H...... 3204.4414: 0000000004745d80/0000: 00 48 83 65 67 00 4c 8d-4d d7 48 83 65 07 00 4c .H.eg.L.M.H.e..L 0000000004745d90/0010: 8d 45 ff 83 65 17 00 48-8d 4d 67 4c 8b e0 c7 45 .E..e..H.MgL...E 0000000004745da0/0020: c7 2c 00 2e 00 48 8d 05-4c fe ff ff c7 45 ff 30 .,...H..L....E.0 0000000004745db0/0030: 00 00 00 48 89 45 cf 0f-57 c0 48 8d 45 c7 ba 00 ...H.E..W.H.E... 0000000004745dc0/0040: 00 10 00 48 89 45 0f 33-c0 21 44 24 50 48 21 44 ...H.E.3.!D$PH!D 0000000004745dd0/0050: 24 48 21 44 24 40 48 21-45 df c7 44 24 38 01 00 $H!D$@H!E..D$8.. 0000000004745de0/0060: 00 00 c7 44 24 30 07 00-00 00 c7 44 24 28 80 00 ...D$0.....D$(.. 0000000004745df0/0070: 00 00 48 21 44 24 20 f3-0f 7f 45 1f 48 89 45 d7 ..H!D$ ...E.H.E. 0000000004745e00/0080: ff d3 85 c0 75 68 83 64-24 48 00 b8 18 00 00 00 ....uh.d$H...... 0000000004745e10/0090: 48 83 64 24 40 00 45 33-c9 48 8b 4d 67 45 33 c0 H.d$@.E3.H.MgE3. 0000000004745e20/00a0: 89 44 24 38 33 d2 89 45-e7 48 8d 45 e7 48 89 44 .D$83..E.H.E.H.D 0000000004745e30/00b0: 24 30 48 8d 45 d7 c7 44-24 28 00 38 22 00 48 89 $0H.E..D$(.8".H. 0000000004745e40/00c0: 44 24 20 c7 45 eb 01 00-00 00 44 89 7d ef 4c 89 D$ .E.....D.}.L. 0000000004745e50/00d0: 75 f3 89 75 fb 41 ff d4-48 8b 4f 08 48 8d 15 8d u..u.A..H.O.H... 0000000004745e60/00e0: fd ff ff e8 2c 01 00 00-48 8b 4d 67 ff d0 4c 8d ....,...H.Mg..L. 0000000004745e70/00f0: 9c 24 d0 00 00 00 49 8b-5b 38 49 8b 73 40 49 8b .$....I.[8I.s@I. 3204.4414: 0000000004745e80/0000: e3 41 5f 41 5e 41 5c 5f-5d c3 cc cc cc cc cc cc .A_A^A\_]....... 0000000004745e90/0010: 48 89 5c 24 10 48 89 6c-24 18 48 89 74 24 20 57 H.\$.H.l$.H.t$ W 0000000004745ea0/0020: 48 83 ec 60 48 8b 31 48-8d 59 18 48 8b f9 33 ed H..`H.1H.Y.H..3. 0000000004745eb0/0030: eb 7b 0f b7 d5 66 89 6c-24 52 66 89 54 24 50 48 .{...f.l$Rf.T$PH 0000000004745ec0/0040: 89 5c 24 58 66 39 2b 74-11 66 ff c2 0f b7 c2 66 .\$Xf9+t.f.....f 0000000004745ed0/0050: 89 54 24 50 66 39 2c 43-75 ef 66 03 d2 f6 47 10 .T$Pf9,Cu.f...G. 0000000004745ee0/0060: 01 66 89 54 24 50 66 89-54 24 52 75 47 4c 8d 4c .f.T$Pf.T$RuGL.L 0000000004745ef0/0070: 24 70 33 d2 4c 8d 44 24-50 33 c9 ff d6 3d 18 00 $p3.L.D$P3...=.. 0000000004745f00/0080: 00 c0 74 30 85 c0 74 15-44 0f b7 4c 24 50 8b d0 ..t0..t.D..L$P.. 0000000004745f10/0090: 4c 8b 44 24 58 48 8b cf-e8 17 fe ff ff 0f b7 44 L.D$XH.........D 0000000004745f20/00a0: 24 50 48 d1 e8 48 8d 1c-43 48 83 c3 02 66 39 2b $PH..H..CH...f9+ 0000000004745f30/00b0: 75 80 eb 48 48 8b 4f 08-48 8d 15 41 fc ff ff e8 u..HH.O.H..A.... 0000000004745f40/00c0: 50 00 00 00 48 85 c0 74-33 48 89 6c 24 48 48 8d P...H..t3H.l$HH. 0000000004745f50/00d0: 0d d3 fc ff ff 48 89 6c-24 40 45 33 c9 48 89 7c .....H.l$@E3.H.| 0000000004745f60/00e0: 24 38 45 33 c0 48 89 4c-24 30 33 d2 48 89 6c 24 $8E3.H.L$03.H.l$ 0000000004745f70/00f0: 28 48 83 c9 ff 48 89 6c-24 20 ff d0 4c 8d 5c 24 (H...H.l$ ..L.\$ 3204.4414: 0000000004745f80/0000: 60 33 c0 49 8b 5b 18 49-8b 6b 20 49 8b 73 28 49 `3.I.[.I.k I.s(I 0000000004745f90/0010: 8b e3 5f c3 48 8b c4 48-89 58 08 48 89 68 10 48 .._.H..H.X.H.h.H 0000000004745fa0/0020: 89 70 18 48 89 78 20 41-54 41 55 41 56 41 57 48 .p.H.x ATAUAVAWH 0000000004745fb0/0030: 63 41 3c 4c 8b c9 48 03-c1 45 33 c0 b9 4c 01 00 cA 0 (\Device\HarddiskVolume4\Windows\System32\kernel32.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\kernel32.dll 2b28.a14: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\System32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000004001: [calling] 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6c7d0000 LB 0x002a4000 C:\WINDOWS\System32\KERNELBASE.dll [fFlags=0x0] 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\KernelBase.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6eb70000 LB 0x000b2000 C:\WINDOWS\System32\KERNEL32.DLL [fFlags=0x0] 2b28.a14: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007fff6eb70000 'C:\WINDOWS\System32\KERNEL32.DLL' 2b28.a14: supR3HardenedDllNotificationCallback: load 00007ff62c2f0000 LB 0x00116000 C:\Program Files\Oracle\VirtualBox\VBoxHeadless.exe [fFlags=0x0] 2b28.a14: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe' has no imports 2b28.a14: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe 2b28.a14: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007fff6f811770 pvNtTerminateThread=00007fff6f83cac0 3204.4414: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 66 ms. 2b28.a14: \SystemRoot\System32\ntdll.dll: 2b28.a14: CreationTime: 2020-07-27T09:29:22.468662600Z 2b28.a14: LastWriteTime: 2020-07-27T09:29:22.507631900Z 2b28.a14: ChangeTime: 2020-07-28T06:10:52.472083500Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x1e8460 2b28.a14: NT Headers: 0xd8 2b28.a14: Timestamp: 0xb29ecf52 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0xb29ecf52 2b28.a14: Image Version: 10.0 2b28.a14: SizeOfImage: 0x1f0000 (2031616) 2b28.a14: Resource Dir: 0x17f000 LB 0x6f310 2b28.a14: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x17f0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Microsoft® Windows® Operating System 2b28.a14: ProductVersion: 10.0.18362.815 2b28.a14: FileVersion: 10.0.18362.815 (WinBuild.160101.0800) 2b28.a14: FileDescription: NT Layer DLL 2b28.a14: \SystemRoot\System32\kernel32.dll: 2b28.a14: CreationTime: 2020-07-27T09:28:50.277970100Z 2b28.a14: LastWriteTime: 2020-07-27T09:28:50.294953700Z 2b28.a14: ChangeTime: 2020-07-28T06:10:41.051213400Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0xb0498 2b28.a14: NT Headers: 0xe8 2b28.a14: Timestamp: 0xce6bbd73 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0xce6bbd73 2b28.a14: Image Version: 10.0 2b28.a14: SizeOfImage: 0xb2000 (729088) 2b28.a14: Resource Dir: 0xb0000 LB 0x520 2b28.a14: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0xb00b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Microsoft® Windows® Operating System 2b28.a14: ProductVersion: 10.0.18362.959 2b28.a14: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 2b28.a14: FileDescription: Windows NT BASE API Client DLL 2b28.a14: \SystemRoot\System32\KernelBase.dll: 2b28.a14: CreationTime: 2020-07-27T09:29:23.091189900Z 2b28.a14: LastWriteTime: 2020-07-27T09:29:23.150058300Z 2b28.a14: ChangeTime: 2020-07-28T06:10:50.315875600Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x2a4058 2b28.a14: NT Headers: 0xf8 2b28.a14: Timestamp: 0x7b90c1b5 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x7b90c1b5 2b28.a14: Image Version: 10.0 2b28.a14: SizeOfImage: 0x2a4000 (2768896) 2b28.a14: Resource Dir: 0x27e000 LB 0x548 2b28.a14: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x27e0b0 LB 0x3bc, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Microsoft® Windows® Operating System 2b28.a14: ProductVersion: 10.0.18362.959 2b28.a14: FileVersion: 10.0.18362.959 (WinBuild.160101.0800) 2b28.a14: FileDescription: Windows NT BASE API Client DLL 2b28.a14: \SystemRoot\System32\apisetschema.dll: 2b28.a14: CreationTime: 2019-03-19T04:43:54.837151500Z 2b28.a14: LastWriteTime: 2019-03-19T04:43:54.837151500Z 2b28.a14: ChangeTime: 2020-07-27T09:30:52.160553000Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x1d028 2b28.a14: NT Headers: 0xc8 2b28.a14: Timestamp: 0xd6ced080 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0xd6ced080 2b28.a14: Image Version: 10.0 2b28.a14: SizeOfImage: 0x1e000 (122880) 2b28.a14: Resource Dir: 0x1d000 LB 0x408 2b28.a14: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x1d060 LB 0x3a8, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Microsoft® Windows® Operating System 2b28.a14: ProductVersion: 10.0.18362.1 2b28.a14: FileVersion: 10.0.18362.1 (WinBuild.160101.0800) 2b28.a14: FileDescription: ApiSet Schema DLL 2b28.a14: NtOpenDirectoryObject failed on \Driver: 0xc0000022 2b28.a14: supR3HardenedWinFindAdversaries: 0x840 2b28.a14: \SystemRoot\System32\drivers\klflt.sys: 2b28.a14: CreationTime: 2020-03-06T08:53:28.856343500Z 2b28.a14: LastWriteTime: 2020-03-12T20:48:02.000000000Z 2b28.a14: ChangeTime: 2020-05-15T10:01:19.828084100Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x3f100 2b28.a14: NT Headers: 0xf8 2b28.a14: Timestamp: 0x5e6a66e9 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x5e6a66e9 2b28.a14: Image Version: 6.1 2b28.a14: SizeOfImage: 0x4d000 (315392) 2b28.a14: Resource Dir: 0x4a000 LB 0x430 2b28.a14: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x4a060 LB 0x3d0, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Coretech Delivery 2b28.a14: ProductVersion: 30.289.132.0-e369c7d411 2b28.a14: FileVersion: 30.289.132.0 2b28.a14: FileDescription: Filter Core [fre_win7_x64] 2b28.a14: \SystemRoot\System32\drivers\klif.sys: 2b28.a14: CreationTime: 2020-03-06T08:53:28.861361800Z 2b28.a14: LastWriteTime: 2020-03-12T20:48:04.000000000Z 2b28.a14: ChangeTime: 2020-05-15T10:01:19.795147700Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x12d500 2b28.a14: NT Headers: 0x100 2b28.a14: Timestamp: 0x5e6a6704 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x5e6a6704 2b28.a14: Image Version: 6.1 2b28.a14: SizeOfImage: 0x12f000 (1241088) 2b28.a14: Resource Dir: 0x125000 LB 0x3410 2b28.a14: [Version info resource found at 0x120! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x128028 LB 0x3e8, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Coretech Delivery 2b28.a14: ProductVersion: 30.289.132.0-e369c7d411 2b28.a14: FileVersion: 30.289.132.0 2b28.a14: FileDescription: Core System Interceptors [fre_win7_x64] 2b28.a14: \SystemRoot\System32\drivers\klim6.sys: 2b28.a14: CreationTime: 2019-01-28T00:49:40.000000000Z 2b28.a14: LastWriteTime: 2020-03-05T01:33:42.000000000Z 2b28.a14: ChangeTime: 2020-05-15T10:01:20.628593700Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x159f0 2b28.a14: NT Headers: 0xe0 2b28.a14: Timestamp: 0x8c875967 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x8c875967 2b28.a14: Image Version: 6.1 2b28.a14: SizeOfImage: 0x12000 (73728) 2b28.a14: Resource Dir: 0x10000 LB 0x448 2b28.a14: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x10060 LB 0x3e4, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Coretech Delivery 2b28.a14: ProductVersion: 30.289.126.0-2a58c6003b 2b28.a14: FileVersion: 30.289.126.0 2b28.a14: FileDescription: Packet Network Filter [fre_win7_x64] 2b28.a14: \SystemRoot\System32\drivers\kneps.sys: 2b28.a14: CreationTime: 2019-04-29T04:50:14.000000000Z 2b28.a14: LastWriteTime: 2020-03-06T02:31:48.000000000Z 2b28.a14: ChangeTime: 2020-05-15T10:01:20.486058100Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x44300 2b28.a14: NT Headers: 0xf8 2b28.a14: Timestamp: 0x359fc650 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x359fc650 2b28.a14: Image Version: 6.1 2b28.a14: SizeOfImage: 0x44000 (278528) 2b28.a14: Resource Dir: 0x41000 LB 0x440 2b28.a14: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x41060 LB 0x3dc, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: Coretech Delivery 2b28.a14: ProductVersion: 30.289.126.0-2a58c6003b 2b28.a14: FileVersion: 30.289.126.0 2b28.a14: FileDescription: Network Processor [fre_win7_x64] 2b28.a14: \SystemRoot\System32\drivers\inspect.sys: 2b28.a14: CreationTime: 2019-10-22T10:41:08.000000000Z 2b28.a14: LastWriteTime: 2019-10-22T10:41:08.000000000Z 2b28.a14: ChangeTime: 2019-12-12T12:56:19.421137100Z 2b28.a14: FileAttributes: 0x20 2b28.a14: Size: 0x137c8 2b28.a14: NT Headers: 0xf8 2b28.a14: Timestamp: 0x5cfbc135 2b28.a14: Machine: 0x8664 - amd64 2b28.a14: Timestamp: 0x5cfbc135 2b28.a14: Image Version: 10.0 2b28.a14: SizeOfImage: 0x14000 (81920) 2b28.a14: Resource Dir: 0x12000 LB 0x690 2b28.a14: [Version info resource found at 0x50! (ID/Name: 0x1; SubID/SubName: 0x409)] 2b28.a14: [Raw version resource data: 0x12070 LB 0x2fc, codepage 0x0 (reserved 0x0)] 2b28.a14: ProductName: DOZOR Agent 2b28.a14: ProductVersion: 3.3.0.0 2b28.a14: FileVersion: 1.0.1.3 2b28.a14: FileDescription: Process Control Driver 2b28.a14: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 2b28.a14: Calling main() 2b28.a14: SUPR3HardenedMain: pszProgName=VBoxHeadless fFlags=0x0 2b28.a14: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 2b28.a14: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe' has no imports 2b28.a14: supHardenedWinVerifyImageByHandle: -> 24202 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxHeadless.exe) 2b28.a14: SUPR3HardenedMain: Respawn #2 2b28.a14: supR3HardNtEnableThreadCreationEx: 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6f450000 LB 0x00120000 C:\WINDOWS\System32\RPCRT4.dll [fFlags=0x0] 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6f3a0000 LB 0x00097000 C:\WINDOWS\System32\sechost.dll [fFlags=0x0] 2b28.a14: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #11 'rpcrt4.dll'. 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sechost.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sechost.dll 2b28.a14: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 2b28.a14: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'sechost.dll'. 2b28.a14: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #27 'rpcrt4.dll'. 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\advapi32.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\advapi32.dll 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 2b28.a14: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sechost.dll'... 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: 'sechost.dll' -> '\Device\HarddiskVolume4\Windows\System32\sechost.dll' [rcNtRedir=0xc0150008] 2b28.a14: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msvcrt.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 2b28.a14: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 2b28.a14: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\System32\ADVAPI32.DLL (Input=ADVAPI32.DLL, rcNtResolve=0xc0150008) *pfFlags=0x1000 pwszSearchPath=0000000000000000: [calling] 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6e120000 LB 0x0009e000 C:\WINDOWS\System32\msvcrt.dll [fFlags=0x0] 2b28.a14: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedDllNotificationCallback: load 00007fff6dda0000 LB 0x000a3000 C:\WINDOWS\System32\ADVAPI32.DLL [fFlags=0x0] 2b28.a14: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust] 2b28.a14: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007fff6dda0000 'C:\WINDOWS\System32\ADVAPI32.DLL' 2b28.a14: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports 2b28.a14: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\ntdll.dll) 2b28.a14: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\ntdll.dll 2b28.a14: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\System32\ntdll.dll (Input=ntdll.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801: [calling] 2b28.a14: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007fff6f7a0000 'C:\WINDOWS\System32\ntdll.dll' 2b28.a14: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007fff6f811770 pvNtTerminateThread=00007fff6f83cac0 2b28.a14: supR3HardenedWinDoReSpawn(2): New child 738.117c [kernel32]. 2b28.a14: supR3HardenedWinReSpawn: NtSetInformationThread/ThreadHideFromDebugger failed: 0xc0000022 (harmless) 2b28.a14: supR3HardNtChildGatherData: PebBaseAddress=0000000000a97000 cbPeb=0x388 2b28.a14: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007fff6f7a0000 uNtDllChildAddr=00007fff6f7a0000 2b28.a14: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007fff6f811770 2b28.a14: supR3HardenedWinSetupChildInit: Initial context: rax=0000000000000000 rbx=0000000000000000 rcx=00007ff62c2f7740 rdx=0000000000a97000 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000 rip=00007fff6f80ce30 rsp=00000000009ef8d8 rbp=0000000000000000 ctxflags=0010001b cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000 2b28.a14: kernel32.dll: timestamp 0xce6bbd73 (rc=VINF_SUCCESS) 2b28.a14: supR3HardenedWinSetupChildInit: Start child. 2b28.a14: KiUserExceptionDispatcher: 0xc0000005 (0000000000000008, 00000000009c0310) @ 00000000009c0310 (flags=0x0) rax=00000000009c0310 rbx=0000000000000002 rcx=00000000009c05a0 rdx=0000000000000000 rsi=00000000000007d0 rdi=0000000000000003 r8 =0000000000000000 r9 =00000000009b88d0 r10=0000000000000000 r11=0000000000000246 r12=0000000000000000 r13=00007ff62c3707b8 r14=00000000068b3e7c r15=000000007ffe000c P1=0000000080079b70 P2=0000000000000001 rip=00000000009c0310 rsp=00000000009b88c8 rbp=00000000009b97a0 ctxflags=0010005f cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b eflags=00010202 mxcrx=00001f80 P3=0000000080079b78 P4=0000000000000001 P5=00000000000005e1 P6=0000000010017500 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000 vcr=0000100000017c70 dcr=0000000180000000 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000 2b28.a14: supR3HardenedIsApiSetDll: ApiSetQueryApiSetPresence(ext-ms-win-kernel32-errorhandling-l1-1-0.dll) -> 0x0, fPresent=1 2b28.a14: supR3HardenedMonitor_LdrLoadDll: pName=ext-ms-win-kernel32-errorhandling-l1-1-0.dll (rcNtResolve=0x0) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 2b28.a14: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007fff6eb70000 'ext-ms-win-kernel32-errorhandling-l1-1-0.dll' 3204.4414: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 3219 ms, the end); 3e0c.2d34: Terminating the normal way: rcExit=0