109c.1590: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000010 g_uNtVerCombined=0x63258000 109c.1590: \SystemRoot\System32\ntdll.dll: 109c.1590: CreationTime: 2020-06-10T07:41:43.891121300Z 109c.1590: LastWriteTime: 2020-03-31T05:42:15.143120700Z 109c.1590: ChangeTime: 2021-02-10T09:25:21.845312200Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x1a8330 109c.1590: NT Headers: 0xd8 109c.1590: Timestamp: 0x5e82c88a 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x5e82c88a 109c.1590: Image Version: 6.3 109c.1590: SizeOfImage: 0x1ad000 (1757184) 109c.1590: Resource Dir: 0x149000 LB 0x62568 109c.1590: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)] 109c.1590: ProductName: Microsoft® Windows® Operating System 109c.1590: ProductVersion: 6.3.9600.19678 109c.1590: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737) 109c.1590: FileDescription: NT Layer DLL 109c.1590: \SystemRoot\System32\kernel32.dll: 109c.1590: CreationTime: 2020-10-14T07:38:35.847512600Z 109c.1590: LastWriteTime: 2020-09-15T07:06:16.877307400Z 109c.1590: ChangeTime: 2021-01-13T08:41:59.941134900Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x140420 109c.1590: NT Headers: 0xe8 109c.1590: Timestamp: 0x5f6047b1 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x5f6047b1 109c.1590: Image Version: 6.3 109c.1590: SizeOfImage: 0x13f000 (1306624) 109c.1590: Resource Dir: 0x12f000 LB 0x530 109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)] 109c.1590: ProductName: Microsoft® Windows® Operating System 109c.1590: ProductVersion: 6.3.9600.19843 109c.1590: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743) 109c.1590: FileDescription: Windows NT BASE API Client DLL 109c.1590: \SystemRoot\System32\KernelBase.dll: 109c.1590: CreationTime: 2020-06-10T07:41:43.132577500Z 109c.1590: LastWriteTime: 2020-05-20T15:20:26.061266900Z 109c.1590: ChangeTime: 2020-10-14T07:40:56.725698500Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x115450 109c.1590: NT Headers: 0xf0 109c.1590: Timestamp: 0x5ec5262a 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x5ec5262a 109c.1590: Image Version: 6.3 109c.1590: SizeOfImage: 0x115000 (1134592) 109c.1590: Resource Dir: 0x110000 LB 0x3540 109c.1590: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)] 109c.1590: ProductName: Microsoft® Windows® Operating System 109c.1590: ProductVersion: 6.3.9600.19724 109c.1590: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914) 109c.1590: FileDescription: Windows NT BASE API Client DLL 109c.1590: \SystemRoot\System32\apisetschema.dll: 109c.1590: CreationTime: 2018-09-27T07:33:46.913079600Z 109c.1590: LastWriteTime: 2018-09-27T07:33:46.913079600Z 109c.1590: ChangeTime: 2018-09-27T07:39:55.522916000Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x11158 109c.1590: NT Headers: 0xd0 109c.1590: Timestamp: 0x57fa67ee 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x57fa67ee 109c.1590: Image Version: 6.3 109c.1590: SizeOfImage: 0x12000 (73728) 109c.1590: Resource Dir: 0x11000 LB 0x3f8 109c.1590: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)] 109c.1590: ProductName: Microsoft® Windows® Operating System 109c.1590: ProductVersion: 6.3.9600.18513 109c.1590: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600) 109c.1590: FileDescription: ApiSet Schema DLL 109c.1590: NtOpenDirectoryObject failed on \Driver: 0xc0000022 109c.1590: supR3HardenedWinFindAdversaries: 0x3 109c.1590: \SystemRoot\System32\drivers\SysPlant.sys: 109c.1590: CreationTime: 2013-11-17T17:14:25.974782000Z 109c.1590: LastWriteTime: 2018-04-07T00:17:18.253894700Z 109c.1590: ChangeTime: 2018-04-07T00:17:18.253894700Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x30548 109c.1590: NT Headers: 0xf0 109c.1590: Timestamp: 0x5a1adc8a 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x5a1adc8a 109c.1590: Image Version: 5.0 109c.1590: SizeOfImage: 0x31000 (200704) 109c.1590: Resource Dir: 0x2f000 LB 0x49c 109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)] 109c.1590: ProductName: Symantec CMC Firewall 109c.1590: ProductVersion: 14.0.3856.1100 109c.1590: FileVersion: 14.0.3856.1100 109c.1590: FileDescription: Symantec CMC Firewall SysPlant 109c.1590: \SystemRoot\System32\sysfer.dll: 109c.1590: CreationTime: 2013-11-17T17:14:25.969767900Z 109c.1590: LastWriteTime: 2018-04-07T00:17:18.249652100Z 109c.1590: ChangeTime: 2018-04-07T00:17:18.249652100Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x7cee8 109c.1590: NT Headers: 0xf8 109c.1590: Timestamp: 0x5a1adc96 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x5a1adc96 109c.1590: Image Version: 0.0 109c.1590: SizeOfImage: 0x95000 (610304) 109c.1590: Resource Dir: 0x91000 LB 0x490 109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)] 109c.1590: ProductName: Symantec CMC Firewall 109c.1590: ProductVersion: 14.0.3856.1100 109c.1590: FileVersion: 14.0.3856.1100 109c.1590: FileDescription: Symantec CMC Firewall sysfer 109c.1590: \SystemRoot\System32\drivers\symevent64x86.sys: 109c.1590: CreationTime: 2013-11-17T17:14:52.378966600Z 109c.1590: LastWriteTime: 2018-04-06T15:17:17.540827600Z 109c.1590: ChangeTime: 2018-04-06T15:17:17.540827600Z 109c.1590: FileAttributes: 0x20 109c.1590: Size: 0x19098 109c.1590: NT Headers: 0xe0 109c.1590: Timestamp: 0x59fcb42b 109c.1590: Machine: 0x8664 - amd64 109c.1590: Timestamp: 0x59fcb42b 109c.1590: Image Version: 6.2 109c.1590: SizeOfImage: 0x23000 (143360) 109c.1590: Resource Dir: 0x21000 LB 0x3c8 109c.1590: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 109c.1590: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 109c.1590: ProductName: SYMEVENT 109c.1590: ProductVersion: 14.0.5.9 109c.1590: FileVersion: 14.0.5.9 109c.1590: FileDescription: Symantec Event Library 109c.1590: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 109c.1590: Calling main() 109c.1590: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2 109c.1590: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 109c.1590: SUPR3HardenedMain: Respawn #1 109c.1590: System32: \Device\HarddiskVolume4\Windows\System32 109c.1590: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS 109c.1590: KnownDllPath: C:\WINDOWS\system32 109c.1590: supR3HardenedWinInit: Performing a limited self purification... 109c.1590: supHardNtVpScanVirtualMemory: enmKind=SELF_PURIFICATION 109c.1590: *0000000000000000-0000000000daffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000db0000-0000000000dbffff 0x0004/0x0004 0x0040000 109c.1590: 0000000000dc0000-0000000000dcffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000dd0000-0000000000ddefff 0x0002/0x0002 0x0040000 109c.1590: 0000000000ddf000-0000000000ddffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000de0000-0000000000e90fff 0x0000/0x0004 0x0020000 109c.1590: 0000000000e91000-0000000000e93fff 0x0104/0x0004 0x0020000 109c.1590: 0000000000e94000-0000000000edffff 0x0004/0x0004 0x0020000 109c.1590: *0000000000ee0000-0000000000ee3fff 0x0002/0x0002 0x0040000 109c.1590: 0000000000ee4000-0000000000eeffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000ef0000-0000000000ef1fff 0x0004/0x0004 0x0020000 109c.1590: 0000000000ef2000-0000000000efffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000f00000-0000000000f01fff 0x0004/0x0004 0x0020000 109c.1590: 0000000000f02000-0000000000f19fff 0x0000/0x0004 0x0020000 109c.1590: 0000000000f1a000-0000000000f2ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000f30000-0000000000f34fff 0x0004/0x0004 0x0020000 109c.1590: 0000000000f35000-000000000102ffff 0x0000/0x0004 0x0020000 109c.1590: *0000000001030000-00000000010adfff 0x0002/0x0002 0x0040000 109c.1590: 00000000010ae000-000000000118ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000001190000-000000000119efff 0x0004/0x0004 0x0020000 109c.1590: 000000000119f000-000000000119ffff 0x0000/0x0004 0x0020000 109c.1590: *00000000011a0000-00000000011abfff 0x0000/0x0004 0x0020000 109c.1590: 00000000011ac000-0000000001359fff 0x0004/0x0004 0x0020000 109c.1590: 000000000135a000-000000000135afff 0x0000/0x0004 0x0020000 109c.1590: 000000000135b000-000000000135ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000001360000-000000000137cfff 0x0004/0x0004 0x0020000 109c.1590: 000000000137d000-000000000145ffff 0x0000/0x0004 0x0020000 109c.1590: 0000000001460000-000000007ffdffff 0x0001/0x0000 0x0000000 109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 109c.1590: 000000007fff0000-00007ff753e6ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff753e70000-00007ff753e74fff 0x0002/0x0002 0x0040000 109c.1590: 00007ff753e75000-00007ff753f6ffff 0x0000/0x0002 0x0040000 109c.1590: *00007ff753f70000-00007ff753f92fff 0x0002/0x0002 0x0040000 109c.1590: 00007ff753f93000-00007ff753f9afff 0x0001/0x0000 0x0000000 109c.1590: *00007ff753f9b000-00007ff753f9bfff 0x0004/0x0004 0x0020000 109c.1590: 00007ff753f9c000-00007ff753f9dfff 0x0001/0x0000 0x0000000 109c.1590: *00007ff753f9e000-00007ff753f9ffff 0x0004/0x0004 0x0020000 109c.1590: 00007ff753fa0000-00007ff754f4ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755012000-00007ff755014fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755015000-00007ff755017fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755018000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501b000-00007ff75501bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501c000-00007ff75501dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501e000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000 109c.1590: 00007ff755071000-00007ffdb0e3ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffdb0e40000-00007ffdb0e40fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 109c.1590: 00007ffdb0e41000-00007ffdb0f32fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 109c.1590: 00007ffdb0f33000-00007ffdb0f35fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 109c.1590: 00007ffdb0f36000-00007ffdb0f36fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 109c.1590: 00007ffdb0f37000-00007ffdb0f54fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 109c.1590: 00007ffdb0f55000-00007ffdb10fffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffdb1100000-00007ffdb1100fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 109c.1590: 00007ffdb1101000-00007ffdb1218fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 109c.1590: 00007ffdb1219000-00007ffdb1219fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 109c.1590: 00007ffdb121a000-00007ffdb121afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 109c.1590: 00007ffdb121b000-00007ffdb123efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\kernel32.dll 109c.1590: 00007ffdb123f000-00007ffdb392ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a64000-00007ffdb3a74fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 109c.1590: kernel32.dll: timestamp 0x5f6047b1 (rc=VINF_SUCCESS) 109c.1590: kernelbase.dll: timestamp 0x5ec5262a (rc=VINF_SUCCESS) 109c.1590: VirtualBoxVM.exe: timestamp 0x60353c8e (rc=VINF_SUCCESS) 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e2. 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e2/now. 109c.1590: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 109c.1590: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory: 109c.1590: 00007ff754f5016a / 0x000016a: 00 != 12 109c.1590: 00007ff754f5016c / 0x000016c: 00 != 14 109c.1590: Restored 0x400 bytes of original file content at 00007ff754f50000 109c.1590: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports 109c.1590: supR3HardenedWinInit: SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED -> VINF_SUCCESS, cFixes=1 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e2. 109c.1590: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e2/now. 109c.1590: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 109c.1590: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 109c.1590: supR3HardNtEnableThreadCreationEx: 109c.1590: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30 109c.1590: supR3HardenedWinDoReSpawn(1): New child 1544.142c [kernel32]. 109c.1590: supR3HardNtChildGatherData: PebBaseAddress=00007ff7546ef000 cbPeb=0x388 109c.1590: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ffdb3930000 uNtDllChildAddr=00007ffdb3930000 109c.1590: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ffdb3948db0 109c.1590: supR3HardenedWinSetupChildInit: Initial context: rax=0000000000000000 rbx=0000000000000000 rcx=00007ff754f57900 rdx=00007ff7546ef000 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000 rip=00007ffdb39454c0 rsp=000000000064f988 rbp=0000000000000000 ctxflags=0010001b cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000 109c.1590: supR3HardenedWinSetupChildInit: Start child. 109c.1590: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 109c.1590: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 47 sleeps 109c.1590: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 109c.1590: *0000000000000000-000000000051ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000520000-000000000053ffff 0x0004/0x0004 0x0020000 109c.1590: *0000000000540000-000000000054efff 0x0002/0x0002 0x0040000 109c.1590: 000000000054f000-000000000054ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000550000-000000000064afff 0x0000/0x0004 0x0020000 109c.1590: 000000000064b000-000000000064dfff 0x0104/0x0004 0x0020000 109c.1590: 000000000064e000-000000000064ffff 0x0004/0x0004 0x0020000 109c.1590: *0000000000650000-0000000000653fff 0x0002/0x0002 0x0040000 109c.1590: 0000000000654000-000000000065ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000660000-0000000000661fff 0x0004/0x0004 0x0020000 109c.1590: 0000000000662000-000000007ffdffff 0x0001/0x0000 0x0000000 109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 109c.1590: 000000007fff0000-00007ff7546bffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff7546c0000-00007ff7546e2fff 0x0002/0x0002 0x0040000 109c.1590: 00007ff7546e3000-00007ff7546ecfff 0x0001/0x0000 0x0000000 109c.1590: *00007ff7546ed000-00007ff7546eefff 0x0004/0x0004 0x0020000 109c.1590: *00007ff7546ef000-00007ff7546effff 0x0004/0x0004 0x0020000 109c.1590: 00007ff7546f0000-00007ff754f4ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755012000-00007ff755012fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755013000-00007ff755013fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755014000-00007ff755018fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755019000-00007ff755019fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501a000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501b000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000 109c.1590: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a71000-00007ffdb3a71fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a72000-00007ffdb3a74fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 109c.1590: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory: 109c.1590: 00007ff754f5016a / 0x000016a: 00 != 12 109c.1590: 00007ff754f5016c / 0x000016c: 00 != 14 109c.1590: Restored 0x400 bytes of original file content at 00007ff754f50000 109c.1590: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x3 109c.1590: supR3HardNtChildPurify: Startup delay kludge #1/1: 523 ms, 42 sleeps 109c.1590: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 109c.1590: *0000000000000000-000000000051ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000520000-000000000053ffff 0x0004/0x0004 0x0020000 109c.1590: *0000000000540000-000000000054efff 0x0002/0x0002 0x0040000 109c.1590: 000000000054f000-000000000054ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000550000-000000000064afff 0x0000/0x0004 0x0020000 109c.1590: 000000000064b000-000000000064dfff 0x0104/0x0004 0x0020000 109c.1590: 000000000064e000-000000000064ffff 0x0004/0x0004 0x0020000 109c.1590: *0000000000650000-0000000000653fff 0x0002/0x0002 0x0040000 109c.1590: 0000000000654000-000000000065ffff 0x0001/0x0000 0x0000000 109c.1590: *0000000000660000-0000000000661fff 0x0004/0x0004 0x0020000 109c.1590: 0000000000662000-000000007ffdffff 0x0001/0x0000 0x0000000 109c.1590: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 109c.1590: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 109c.1590: 000000007fff0000-00007ff7546bffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff7546c0000-00007ff7546e2fff 0x0002/0x0002 0x0040000 109c.1590: 00007ff7546e3000-00007ff7546ecfff 0x0001/0x0000 0x0000000 109c.1590: *00007ff7546ed000-00007ff7546eefff 0x0004/0x0004 0x0020000 109c.1590: *00007ff7546ef000-00007ff7546effff 0x0004/0x0004 0x0020000 109c.1590: 00007ff7546f0000-00007ff754f4ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff754f50000-00007ff754f50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc8000-00007ff754fc8fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755012000-00007ff75501efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 109c.1590: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000 109c.1590: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a71000-00007ffdb3a74fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 109c.1590: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000 109c.1590: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 109c.1590: supR3HardNtChildPurify: Done after 1042 ms and 1 fixes (loop #1). 1544.142c: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x63258000 1544.142c: supR3HardenedVmProcessInit: uNtDllAddr=00007ffdb3930000 g_uNtVerCombined=0x63258000 (stack ~000000000064f438) 1544.142c: ntdll.dll: timestamp 0x5e82c88a (rc=VINF_SUCCESS) 1544.142c: New simple heap: #1 0000000000770000 LB 0x400000 (for 1757184 allocation) 109c.1590: supR3HardNtEnableThreadCreationEx: 1544.142c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 1544.142c: System32: \Device\HarddiskVolume4\Windows\System32 1544.142c: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS 1544.142c: KnownDllPath: C:\WINDOWS\system32 1544.142c: supR3HardenedVmProcessInit: Opening vboxdrv stub... 1544.142c: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 1544.142c: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 1544.142c: Registered Dll notification callback with NTDLL. 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\kernel32.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\kernel32.dll 1544.142c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000801: [calling] 1544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb0e40000 LB 0x00115000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0] 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\KernelBase.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1100000 LB 0x0013f000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\KERNEL32.DLL' 1544.142c: supR3HardenedDllNotificationCallback: load 00007ff754f50000 LB 0x00118000 c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe [fFlags=0x0] 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3. 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now. 1544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30 109c.1590: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 78 ms. 1544.142c: \SystemRoot\System32\ntdll.dll: 1544.142c: CreationTime: 2020-06-10T07:41:43.891121300Z 1544.142c: LastWriteTime: 2020-03-31T05:42:15.143120700Z 1544.142c: ChangeTime: 2021-02-10T09:25:21.845312200Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x1a8330 1544.142c: NT Headers: 0xd8 1544.142c: Timestamp: 0x5e82c88a 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x5e82c88a 1544.142c: Image Version: 6.3 1544.142c: SizeOfImage: 0x1ad000 (1757184) 1544.142c: Resource Dir: 0x149000 LB 0x62568 1544.142c: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)] 1544.142c: ProductName: Microsoft® Windows® Operating System 1544.142c: ProductVersion: 6.3.9600.19678 1544.142c: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737) 1544.142c: FileDescription: NT Layer DLL 1544.142c: \SystemRoot\System32\kernel32.dll: 1544.142c: CreationTime: 2020-10-14T07:38:35.847512600Z 1544.142c: LastWriteTime: 2020-09-15T07:06:16.877307400Z 1544.142c: ChangeTime: 2021-01-13T08:41:59.941134900Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x140420 1544.142c: NT Headers: 0xe8 1544.142c: Timestamp: 0x5f6047b1 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x5f6047b1 1544.142c: Image Version: 6.3 1544.142c: SizeOfImage: 0x13f000 (1306624) 1544.142c: Resource Dir: 0x12f000 LB 0x530 1544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)] 1544.142c: ProductName: Microsoft® Windows® Operating System 1544.142c: ProductVersion: 6.3.9600.19843 1544.142c: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743) 1544.142c: FileDescription: Windows NT BASE API Client DLL 1544.142c: \SystemRoot\System32\KernelBase.dll: 1544.142c: CreationTime: 2020-06-10T07:41:43.132577500Z 1544.142c: LastWriteTime: 2020-05-20T15:20:26.061266900Z 1544.142c: ChangeTime: 2020-10-14T07:40:56.725698500Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x115450 1544.142c: NT Headers: 0xf0 1544.142c: Timestamp: 0x5ec5262a 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x5ec5262a 1544.142c: Image Version: 6.3 1544.142c: SizeOfImage: 0x115000 (1134592) 1544.142c: Resource Dir: 0x110000 LB 0x3540 1544.142c: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)] 1544.142c: ProductName: Microsoft® Windows® Operating System 1544.142c: ProductVersion: 6.3.9600.19724 1544.142c: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914) 1544.142c: FileDescription: Windows NT BASE API Client DLL 1544.142c: \SystemRoot\System32\apisetschema.dll: 1544.142c: CreationTime: 2018-09-27T07:33:46.913079600Z 1544.142c: LastWriteTime: 2018-09-27T07:33:46.913079600Z 1544.142c: ChangeTime: 2018-09-27T07:39:55.522916000Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x11158 1544.142c: NT Headers: 0xd0 1544.142c: Timestamp: 0x57fa67ee 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x57fa67ee 1544.142c: Image Version: 6.3 1544.142c: SizeOfImage: 0x12000 (73728) 1544.142c: Resource Dir: 0x11000 LB 0x3f8 1544.142c: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)] 1544.142c: ProductName: Microsoft® Windows® Operating System 1544.142c: ProductVersion: 6.3.9600.18513 1544.142c: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600) 1544.142c: FileDescription: ApiSet Schema DLL 1544.142c: NtOpenDirectoryObject failed on \Driver: 0xc0000022 1544.142c: supR3HardenedWinFindAdversaries: 0x3 1544.142c: \SystemRoot\System32\drivers\SysPlant.sys: 1544.142c: CreationTime: 2013-11-17T17:14:25.974782000Z 1544.142c: LastWriteTime: 2018-04-07T00:17:18.253894700Z 1544.142c: ChangeTime: 2018-04-07T00:17:18.253894700Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x30548 1544.142c: NT Headers: 0xf0 1544.142c: Timestamp: 0x5a1adc8a 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x5a1adc8a 1544.142c: Image Version: 5.0 1544.142c: SizeOfImage: 0x31000 (200704) 1544.142c: Resource Dir: 0x2f000 LB 0x49c 1544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)] 1544.142c: ProductName: Symantec CMC Firewall 1544.142c: ProductVersion: 14.0.3856.1100 1544.142c: FileVersion: 14.0.3856.1100 1544.142c: FileDescription: Symantec CMC Firewall SysPlant 1544.142c: \SystemRoot\System32\sysfer.dll: 1544.142c: CreationTime: 2013-11-17T17:14:25.969767900Z 1544.142c: LastWriteTime: 2018-04-07T00:17:18.249652100Z 1544.142c: ChangeTime: 2018-04-07T00:17:18.249652100Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x7cee8 1544.142c: NT Headers: 0xf8 1544.142c: Timestamp: 0x5a1adc96 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x5a1adc96 1544.142c: Image Version: 0.0 1544.142c: SizeOfImage: 0x95000 (610304) 1544.142c: Resource Dir: 0x91000 LB 0x490 1544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)] 1544.142c: ProductName: Symantec CMC Firewall 1544.142c: ProductVersion: 14.0.3856.1100 1544.142c: FileVersion: 14.0.3856.1100 1544.142c: FileDescription: Symantec CMC Firewall sysfer 1544.142c: \SystemRoot\System32\drivers\symevent64x86.sys: 1544.142c: CreationTime: 2013-11-17T17:14:52.378966600Z 1544.142c: LastWriteTime: 2018-04-06T15:17:17.540827600Z 1544.142c: ChangeTime: 2018-04-06T15:17:17.540827600Z 1544.142c: FileAttributes: 0x20 1544.142c: Size: 0x19098 1544.142c: NT Headers: 0xe0 1544.142c: Timestamp: 0x59fcb42b 1544.142c: Machine: 0x8664 - amd64 1544.142c: Timestamp: 0x59fcb42b 1544.142c: Image Version: 6.2 1544.142c: SizeOfImage: 0x23000 (143360) 1544.142c: Resource Dir: 0x21000 LB 0x3c8 1544.142c: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1544.142c: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 1544.142c: ProductName: SYMEVENT 1544.142c: ProductVersion: 14.0.5.9 1544.142c: FileVersion: 14.0.5.9 1544.142c: FileDescription: Symantec Event Library 1544.142c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 1544.142c: Calling main() 1544.142c: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2 1544.142c: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3. 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now. 1544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 1544.142c: SUPR3HardenedMain: Respawn #2 1544.142c: supR3HardNtEnableThreadCreationEx: 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #5 'sechost.dll'. 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #18 'rpcrt4.dll'. 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\advapi32.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\advapi32.dll 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #22 'sspicli.dll'. 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sechost.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'sechost.dll' -> '\Device\HarddiskVolume4\Windows\System32\sechost.dll' [rcNtRedir=0xc0150008] 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #2 'rpcrt4.dll'. 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sechost.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sechost.dll 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msvcrt.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 1544.142c: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sspicli.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'sspicli.dll' -> '\Device\HarddiskVolume4\Windows\System32\sspicli.dll' [rcNtRedir=0xc0150008] 1544.142c: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'rpcrt4.dll'. 1544.142c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sspicli.dll) 1544.142c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sspicli.dll 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 1544.142c: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 1544.142c: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\ADVAPI32.DLL (Input=ADVAPI32.DLL, rcNtResolve=0xc0150008) *pfFlags=0x1000 pwszSearchPath=0000000000000000: [calling] 1544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1d60000 LB 0x000aa000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb0e10000 LB 0x0002e000 C:\WINDOWS\system32\SspiCli.dll [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sspicli.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1530000 LB 0x0013f000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb1990000 LB 0x00058000 C:\WINDOWS\SYSTEM32\sechost.dll [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedDllNotificationCallback: load 00007ffdb22f0000 LB 0x000aa000 C:\WINDOWS\system32\ADVAPI32.DLL [fFlags=0x0] 1544.142c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust] 1544.142c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb22f0000 'C:\WINDOWS\system32\ADVAPI32.DLL' 1544.142c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30 1544.142c: supR3HardenedWinDoReSpawn(2): New child 140c.1420 [kernel32]. 1544.142c: supR3HardNtChildGatherData: PebBaseAddress=00007ff754d5b000 cbPeb=0x388 1544.142c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=00007ffdb3930000 uNtDllChildAddr=00007ffdb3930000 1544.142c: supR3HardenedWinSetupChildInit: uLdrInitThunk=00007ffdb3948db0 1544.142c: supR3HardenedWinSetupChildInit: Initial context: rax=0000000000000000 rbx=0000000000000000 rcx=00007ff754f57900 rdx=00007ff754d5b000 rsi=0000000000000000 rdi=0000000000000000 r8 =0000000000000000 r9 =0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 P1=0000000000000000 P2=0000000000000000 rip=00007ffdb39454c0 rsp=00000000003ffe68 rbp=0000000000000000 ctxflags=0010001b cs=0033 ss=002b ds=0000 es=0000 fs=0000 gs=0000 eflags=00000200 mxcrx=00001f80 P3=0000000000000000 P4=0000000000000000 P5=0000000000000000 P6=0000000000000000 dr0=0000000000000000 dr1=0000000000000000 dr2=0000000000000000 dr3=0000000000000000 dr6=0000000000000000 dr7=0000000000000000 vcr=0000000000000000 dcr=0000000000000000 lbt=0000000000000000 lbf=0000000000000000 lxt=0000000000000000 lxf=0000000000000000 1544.142c: kernel32.dll: timestamp 0x5f6047b1 (rc=VINF_SUCCESS) 1544.142c: supR3HardenedWinSetupChildInit: Start child. 1544.142c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 1544.142c: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps 1544.142c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1544.142c: *0000000000000000-00000000002cffff 0x0001/0x0000 0x0000000 1544.142c: *00000000002d0000-00000000002effff 0x0004/0x0004 0x0020000 1544.142c: *00000000002f0000-00000000002fefff 0x0002/0x0002 0x0040000 1544.142c: 00000000002ff000-00000000002fffff 0x0001/0x0000 0x0000000 1544.142c: *0000000000300000-00000000003fafff 0x0000/0x0004 0x0020000 1544.142c: 00000000003fb000-00000000003fdfff 0x0104/0x0004 0x0020000 1544.142c: 00000000003fe000-00000000003fffff 0x0004/0x0004 0x0020000 1544.142c: *0000000000400000-0000000000403fff 0x0002/0x0002 0x0040000 1544.142c: 0000000000404000-000000000040ffff 0x0001/0x0000 0x0000000 1544.142c: *0000000000410000-0000000000411fff 0x0004/0x0004 0x0020000 1544.142c: 0000000000412000-000000007ffdffff 0x0001/0x0000 0x0000000 1544.142c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 1544.142c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 1544.142c: 000000007fff0000-00007ff754d2ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d30000-00007ff754d52fff 0x0002/0x0002 0x0040000 1544.142c: 00007ff754d53000-00007ff754d5afff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d5b000-00007ff754d5bfff 0x0004/0x0004 0x0020000 1544.142c: 00007ff754d5c000-00007ff754d5dfff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d5e000-00007ff754d5ffff 0x0004/0x0004 0x0020000 1544.142c: 00007ff754d60000-00007ff754f4ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754f50000-00007ff754f50fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754fc8000-00007ff754fc8fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755012000-00007ff755012fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755013000-00007ff755013fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755014000-00007ff755018fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755019000-00007ff755019fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff75501a000-00007ff75501afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff75501b000-00007ff75501efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000 1544.142c: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a5e000-00007ffdb3a63fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a71000-00007ffdb3a71fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a72000-00007ffdb3a74fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000 1544.142c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 1544.142c: VirtualBoxVM.exe: timestamp 0x60353c8e (rc=VINF_SUCCESS) 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e3. 1544.142c: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e3/now. 1544.142c: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 1544.142c: VirtualBoxVM.exe: Differences in section #0 (headers) between file and memory: 1544.142c: 00007ff754f5016a / 0x000016a: 00 != 12 1544.142c: 00007ff754f5016c / 0x000016c: 00 != 14 1544.142c: Restored 0x400 bytes of original file content at 00007ff754f50000 1544.142c: '\Device\HarddiskVolume4\Windows\System32\ntdll.dll' has no imports 1544.142c: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x3 1544.142c: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps 1544.142c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1544.142c: *0000000000000000-00000000002cffff 0x0001/0x0000 0x0000000 1544.142c: *00000000002d0000-00000000002effff 0x0004/0x0004 0x0020000 1544.142c: *00000000002f0000-00000000002fefff 0x0002/0x0002 0x0040000 1544.142c: 00000000002ff000-00000000002fffff 0x0001/0x0000 0x0000000 1544.142c: *0000000000300000-00000000003fafff 0x0000/0x0004 0x0020000 1544.142c: 00000000003fb000-00000000003fdfff 0x0104/0x0004 0x0020000 1544.142c: 00000000003fe000-00000000003fffff 0x0004/0x0004 0x0020000 1544.142c: *0000000000400000-0000000000403fff 0x0002/0x0002 0x0040000 1544.142c: 0000000000404000-000000000040ffff 0x0001/0x0000 0x0000000 1544.142c: *0000000000410000-0000000000411fff 0x0004/0x0004 0x0020000 1544.142c: 0000000000412000-000000007ffdffff 0x0001/0x0000 0x0000000 1544.142c: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 1544.142c: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 1544.142c: 000000007fff0000-00007ff754d2ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d30000-00007ff754d52fff 0x0002/0x0002 0x0040000 1544.142c: 00007ff754d53000-00007ff754d5afff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d5b000-00007ff754d5bfff 0x0004/0x0004 0x0020000 1544.142c: 00007ff754d5c000-00007ff754d5dfff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754d5e000-00007ff754d5ffff 0x0004/0x0004 0x0020000 1544.142c: 00007ff754d60000-00007ff754f4ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff754f50000-00007ff754f50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754f51000-00007ff754fc7fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754fc8000-00007ff754fc8fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff754fc9000-00007ff755011fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755012000-00007ff75501efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff75501f000-00007ff755067fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 1544.142c: 00007ff755068000-00007ff75506ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ff755070000-00007ff755070fff 0x0004/0x0004 0x0020000 1544.142c: 00007ff755071000-00007ffdb392ffff 0x0001/0x0000 0x0000000 1544.142c: *00007ffdb3930000-00007ffdb3930fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3931000-00007ffdb3a5dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a5e000-00007ffdb3a63fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a64000-00007ffdb3a70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a71000-00007ffdb3a74fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a75000-00007ffdb3a75fff 0x0010/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3a76000-00007ffdb3adcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume4\Windows\System32\ntdll.dll 1544.142c: 00007ffdb3add000-00007ffffffdffff 0x0001/0x0000 0x0000000 1544.142c: *00007ffffffe0000-00007ffffffeffff 0x0001/0x0002 0x0020000 1544.142c: supR3HardNtChildPurify: Done after 1062 ms and 1 fixes (loop #1). 140c.1420: Log file opened: 6.1.19r142917 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x63258000 140c.1420: supR3HardenedVmProcessInit: uNtDllAddr=00007ffdb3930000 g_uNtVerCombined=0x63258000 (stack ~00000000003ff918) 140c.1420: ntdll.dll: timestamp 0x5e82c88a (rc=VINF_SUCCESS) 140c.1420: New simple heap: #1 0000000000520000 LB 0x400000 (for 1757184 allocation) 1544.142c: supR3HardenedEarlyCompact: Removed heap 1 (0x00000000770000 LB 0x400000) 1544.142c: supR3HardNtEnableThreadCreationEx: 140c.1420: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 140c.1420: System32: \Device\HarddiskVolume4\Windows\System32 140c.1420: WinSxS: \Device\HarddiskVolume4\Windows\WinSxS 140c.1420: KnownDllPath: C:\WINDOWS\system32 140c.1420: supR3HardenedVmProcessInit: Opening vboxdrv... 140c.1420: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 140c.1420: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 140c.1420: Registered Dll notification callback with NTDLL. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\kernel32.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\kernel32.dll 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000801: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0e40000 LB 0x00115000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0] 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\KernelBase.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\KernelBase.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1100000 LB 0x0013f000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\KERNEL32.DLL' 140c.1420: supR3HardenedDllNotificationCallback: load 00007ff754f50000 LB 0x00118000 c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe [fFlags=0x0] 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4. 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now. 140c.1420: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe 140c.1420: supR3HardNtDisableThreadCreation: pvLdrInitThunk=00007ffdb3948db0 pvNtTerminateThread=00007ffdb39c0c30 1544.142c: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 78 ms. 140c.1420: \SystemRoot\System32\ntdll.dll: 140c.1420: CreationTime: 2020-06-10T07:41:43.891121300Z 140c.1420: LastWriteTime: 2020-03-31T05:42:15.143120700Z 140c.1420: ChangeTime: 2021-02-10T09:25:21.845312200Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x1a8330 140c.1420: NT Headers: 0xd8 140c.1420: Timestamp: 0x5e82c88a 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x5e82c88a 140c.1420: Image Version: 6.3 140c.1420: SizeOfImage: 0x1ad000 (1757184) 140c.1420: Resource Dir: 0x149000 LB 0x62568 140c.1420: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x1490f0 LB 0x390, codepage 0x0 (reserved 0x0)] 140c.1420: ProductName: Microsoft® Windows® Operating System 140c.1420: ProductVersion: 6.3.9600.19678 140c.1420: FileVersion: 6.3.9600.19678 (winblue_ltsb_escrow.200330-1737) 140c.1420: FileDescription: NT Layer DLL 140c.1420: \SystemRoot\System32\kernel32.dll: 140c.1420: CreationTime: 2020-10-14T07:38:35.847512600Z 140c.1420: LastWriteTime: 2020-09-15T07:06:16.877307400Z 140c.1420: ChangeTime: 2021-01-13T08:41:59.941134900Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x140420 140c.1420: NT Headers: 0xe8 140c.1420: Timestamp: 0x5f6047b1 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x5f6047b1 140c.1420: Image Version: 6.3 140c.1420: SizeOfImage: 0x13f000 (1306624) 140c.1420: Resource Dir: 0x12f000 LB 0x530 140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x12f0b0 LB 0x3b4, codepage 0x0 (reserved 0x0)] 140c.1420: ProductName: Microsoft® Windows® Operating System 140c.1420: ProductVersion: 6.3.9600.19843 140c.1420: FileVersion: 6.3.9600.19843 (winblue_ltsb_escrow.200914-1743) 140c.1420: FileDescription: Windows NT BASE API Client DLL 140c.1420: \SystemRoot\System32\KernelBase.dll: 140c.1420: CreationTime: 2020-06-10T07:41:43.132577500Z 140c.1420: LastWriteTime: 2020-05-20T15:20:26.061266900Z 140c.1420: ChangeTime: 2020-10-14T07:40:56.725698500Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x115450 140c.1420: NT Headers: 0xf0 140c.1420: Timestamp: 0x5ec5262a 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x5ec5262a 140c.1420: Image Version: 6.3 140c.1420: SizeOfImage: 0x115000 (1134592) 140c.1420: Resource Dir: 0x110000 LB 0x3540 140c.1420: [Version info resource found at 0x108! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x110120 LB 0x3cc, codepage 0x0 (reserved 0x0)] 140c.1420: ProductName: Microsoft® Windows® Operating System 140c.1420: ProductVersion: 6.3.9600.19724 140c.1420: FileVersion: 6.3.9600.19724 (winblue_ltsb_escrow.200519-1914) 140c.1420: FileDescription: Windows NT BASE API Client DLL 140c.1420: \SystemRoot\System32\apisetschema.dll: 140c.1420: CreationTime: 2018-09-27T07:33:46.913079600Z 140c.1420: LastWriteTime: 2018-09-27T07:33:46.913079600Z 140c.1420: ChangeTime: 2018-09-27T07:39:55.522916000Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x11158 140c.1420: NT Headers: 0xd0 140c.1420: Timestamp: 0x57fa67ee 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x57fa67ee 140c.1420: Image Version: 6.3 140c.1420: SizeOfImage: 0x12000 (73728) 140c.1420: Resource Dir: 0x11000 LB 0x3f8 140c.1420: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x11060 LB 0x398, codepage 0x0 (reserved 0x0)] 140c.1420: ProductName: Microsoft® Windows® Operating System 140c.1420: ProductVersion: 6.3.9600.18513 140c.1420: FileVersion: 6.3.9600.18513 (winblue_ltsb.161009-0600) 140c.1420: FileDescription: ApiSet Schema DLL 140c.1420: NtOpenDirectoryObject failed on \Driver: 0xc0000022 140c.1420: supR3HardenedWinFindAdversaries: 0x3 140c.1420: \SystemRoot\System32\drivers\SysPlant.sys: 140c.1420: CreationTime: 2013-11-17T17:14:25.974782000Z 140c.1420: LastWriteTime: 2018-04-07T00:17:18.253894700Z 140c.1420: ChangeTime: 2018-04-07T00:17:18.253894700Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x30548 140c.1420: NT Headers: 0xf0 140c.1420: Timestamp: 0x5a1adc8a 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x5a1adc8a 140c.1420: Image Version: 5.0 140c.1420: SizeOfImage: 0x31000 (200704) 140c.1420: Resource Dir: 0x2f000 LB 0x49c 140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x2f0b8 LB 0x3e4, codepage 0x4e4 (reserved 0x0)] 140c.1420: ProductName: Symantec CMC Firewall 140c.1420: ProductVersion: 14.0.3856.1100 140c.1420: FileVersion: 14.0.3856.1100 140c.1420: FileDescription: Symantec CMC Firewall SysPlant 140c.1420: \SystemRoot\System32\sysfer.dll: 140c.1420: CreationTime: 2013-11-17T17:14:25.969767900Z 140c.1420: LastWriteTime: 2018-04-07T00:17:18.249652100Z 140c.1420: ChangeTime: 2018-04-07T00:17:18.249652100Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x7cee8 140c.1420: NT Headers: 0xf8 140c.1420: Timestamp: 0x5a1adc96 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x5a1adc96 140c.1420: Image Version: 0.0 140c.1420: SizeOfImage: 0x95000 (610304) 140c.1420: Resource Dir: 0x91000 LB 0x490 140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x910b8 LB 0x3d8, codepage 0x4e4 (reserved 0x0)] 140c.1420: ProductName: Symantec CMC Firewall 140c.1420: ProductVersion: 14.0.3856.1100 140c.1420: FileVersion: 14.0.3856.1100 140c.1420: FileDescription: Symantec CMC Firewall sysfer 140c.1420: \SystemRoot\System32\drivers\symevent64x86.sys: 140c.1420: CreationTime: 2013-11-17T17:14:52.378966600Z 140c.1420: LastWriteTime: 2018-04-06T15:17:17.540827600Z 140c.1420: ChangeTime: 2018-04-06T15:17:17.540827600Z 140c.1420: FileAttributes: 0x20 140c.1420: Size: 0x19098 140c.1420: NT Headers: 0xe0 140c.1420: Timestamp: 0x59fcb42b 140c.1420: Machine: 0x8664 - amd64 140c.1420: Timestamp: 0x59fcb42b 140c.1420: Image Version: 6.2 140c.1420: SizeOfImage: 0x23000 (143360) 140c.1420: Resource Dir: 0x21000 LB 0x3c8 140c.1420: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 140c.1420: [Raw version resource data: 0x210b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 140c.1420: ProductName: SYMEVENT 140c.1420: ProductVersion: 14.0.5.9 140c.1420: FileVersion: 14.0.5.9 140c.1420: FileDescription: Symantec Event Library 140c.1420: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 140c.1420: Calling main() 140c.1420: SUPR3HardenedMain: pszProgName=VirtualBoxVM fFlags=0x2 140c.1420: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox' 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #1/2: info status: 24202 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4. 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now. 140c.1420: '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' has no imports 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe) 140c.1420: SUPR3HardenedMain: Final process, opening VBoxDrv... 140c.1420: supR3HardenedEarlyCompact: Removed heap 1 (0x00000000520000 LB 0x400000) 140c.1420: supR3HardNtEnableThreadCreationEx: 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #1/2: info status: 24202 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME for 0x60353c8e; retrying against current time: 0x603769e4. 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll: Signature #2/2: VERR_CR_X509_CPV_NOT_VALID_AT_TIME (-23033) w/ timestamp=0x603769e4/now. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffd9b140000 LB 0x00005000 c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd9b140000 'c:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL' 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'crypt32.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #19 'msasn1.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #29 'rpcrt4.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\wintrust.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\wintrust.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #22 'sspicli.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008] 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msasn1.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msasn1.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume4\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #28 'msasn1.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\crypt32.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\crypt32.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\msvcrt.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\msvcrt.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msasn1.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sspicli.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'sspicli.dll' -> '\Device\HarddiskVolume4\Windows\System32\sspicli.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'rpcrt4.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sspicli.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sspicli.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\Wintrust.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #2 'rpcrt4.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\sechost.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\sechost.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1d60000 LB 0x000aa000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b00000 LB 0x00011000 C:\WINDOWS\system32\MSASN1.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msasn1.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b80000 LB 0x001de000 C:\WINDOWS\system32\CRYPT32.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1990000 LB 0x00058000 C:\WINDOWS\SYSTEM32\sechost.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0e10000 LB 0x0002e000 C:\WINDOWS\system32\SspiCli.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sspicli.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1530000 LB 0x0013f000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0b20000 LB 0x00051000 C:\WINDOWS\system32\Wintrust.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\WINDOWS\system32\Wintrust.dll' 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\bcrypt.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\bcrypt.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcrypt.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000801: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0590000 LB 0x00026000 C:\WINDOWS\system32\bcrypt.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0590000 'C:\WINDOWS\system32\bcrypt.dll' 140c.1420: bcrypt.dll loaded at 00007ffdb0590000, BCryptOpenAlgorithmProvider at 00007ffdb0593490, preloading providers: 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcryptprimitives.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb08b0000 LB 0x00063000 C:\WINDOWS\system32\bcryptprimitives.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb08b0000 'C:\WINDOWS\system32\bcryptprimitives.dll' 140c.1420: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=0000000000a6a520) 140c.1420: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=0000000000a6b090) 140c.1420: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=0000000000a6b1c0) 140c.1420: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=0000000000a6b420) 140c.1420: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=0000000000a6b550) 140c.1420: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=0000000000a6b680) 140c.1420: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=0000000000a6b8d0) 140c.1420: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=0000000000a6ba00) 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\cryptsp.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptsp.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0380000 LB 0x00020000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\cryptsp.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcrypt.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\rsaenh.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\rsaenh.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0250000 LB 0x00036000 C:\WINDOWS\system32\rsaenh.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcryptprimitives.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\cryptbase.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptbase.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0920000 LB 0x0000b000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\cryptbase.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcryptprimitives.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcryptprimitives.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1100000 'C:\WINDOWS\system32\kernel32.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\WINTRUST.DLL (Input=WINTRUST.DLL, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\WINDOWS\system32\WINTRUST.DLL' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\CRYPT32.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\CRYPT32.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b20000 'C:\Windows\System32\WINTRUST.DLL' 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1cd0000 LB 0x00016000 C:\WINDOWS\system32\imagehlp.dll [fFlags=0x0] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\imagehlp.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\imagehlp.dll 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #7 'bcrypt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #8 'ntasn1.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\ncrypt.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\ncrypt.dll 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\ntasn1.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\ntasn1.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0520000 LB 0x00037000 C:\WINDOWS\SYSTEM32\NTASN1.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ntasn1.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0560000 LB 0x00025000 C:\WINDOWS\SYSTEM32\ncrypt.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ncrypt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #10 'rpcrt4.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\gpapi.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\gpapi.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdafc10000 LB 0x00024000 C:\WINDOWS\SYSTEM32\gpapi.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\gpapi.dll [lacks WinVerifyTrust] 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\profapi.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\profapi.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb0a50000 LB 0x00015000 C:\WINDOWS\SYSTEM32\profapi.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\profapi.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #3 'crypt32.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #10 'wldap32.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume4\Windows\System32\cryptnet.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\cryptnet.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'wldap32.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'wldap32.dll' -> '\Device\HarddiskVolume4\Windows\System32\wldap32.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume4\Windows\System32\Wldap32.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\Wldap32.dll 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume4\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'ntasn1.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'ntasn1.dll' -> '\Device\HarddiskVolume4\Windows\System32\ntasn1.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\ntasn1.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\bcrypt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (Input=cryptnet.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb1240000 LB 0x0005c000 C:\WINDOWS\system32\WLDAP32.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\Wldap32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffd89480000 LB 0x00033000 C:\WINDOWS\system32\cryptnet.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\cryptnet.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\WINDOWS\system32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume4\Windows\System32\cryptnet.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffd89480000 'C:\Windows\System32\cryptnet.dll' 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #5 'sechost.dll'. 140c.1420: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #18 'rpcrt4.dll'. 140c.1420: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume4\Windows\System32\advapi32.dll) 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Windows\System32\advapi32.dll 140c.1420: supR3HardenedDllNotificationCallback: load 00007ffdb22f0000 LB 0x000aa000 C:\WINDOWS\SYSTEM32\advapi32.dll [fFlags=0x0] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\advapi32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'sechost.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'sechost.dll' -> '\Device\HarddiskVolume4\Windows\System32\sechost.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\sechost.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'... 140c.1420: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008] 140c.1420: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\msvcrt.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000000 pwszName=\SystemRoot\System32\ntdll.dll 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: New context 0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=5C1D3464CD79E6AC99FD3875E99A7BB19EA62EA5 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rpcrt4.dll (Input=rpcrt4.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb1530000 'C:\WINDOWS\system32\rpcrt4.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_145_for_KB4565540~31bf3856ad364e35~amd64~~6.3.1.14.cat'; file='\SystemRoot\System32\ntdll.dll' 140c.1420: g_pfnWinVerifyTrust=00007ffdb0b21050 140c.1420: supR3HardenedScreenImage/preload: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [redoing WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedScreenImage/preload: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\crypt32.dll' 140c.1420: supR3HardenedScreenImage/preload: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\wintrust.dll [redoing WinVerifyTrust] 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedScreenImage/preload: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\wintrust.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\advapi32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000370 pwszName=\Device\HarddiskVolume4\Windows\System32\Wldap32.dll 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=C703EA5C53886AFFF727297D74E706540A242423 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1666_for_KB4592484~31bf3856ad364e35~amd64~~6.3.1.9.cat'; file='\Device\HarddiskVolume4\Windows\System32\Wldap32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900) 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 22900) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\Wldap32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hFile=000000000000036c pwszName=\Device\HarddiskVolume4\Windows\System32\cryptnet.dll 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=0000000000b10cb0 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=7F501A7B907459FED689C7B6483581A8D309E60F 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_1666_for_KB4592484~31bf3856ad364e35~amd64~~6.3.1.9.cat'; file='\Device\HarddiskVolume4\Windows\System32\cryptnet.dll' 140c.1420: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900) 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 22900) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptnet.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\profapi.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\gpapi.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\ntasn1.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\ncrypt.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\crypt32.dll 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\crypt32.dll (Input=crypt32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\imagehlp.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=0000000000000001: [calling] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptbase.dll' 140c.1420: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume4\Windows\System32\rsaenh.dll [lacks WinVerifyTrust] 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\cryptsp.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\bcryptprimitives.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\bcrypt.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\sechost.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\sspicli.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\msvcrt.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\msasn1.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\rpcrt4.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxSupLib.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.exe' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\KernelBase.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinVerifyCacheProcessWvtTodos: 0 (was 0) fWinVerifyTrust=1 for '\Device\HarddiskVolume4\Windows\System32\kernel32.dll' 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0b80000 'C:\WINDOWS\system32\crypt32.dll' 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x5ad46780fa5df300 DC=com, DC=microsoft, CN=Microsoft Root Certificate Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xea5386456178582b C=ZA, ST=Western Cape, L=Durbanville, O=Thawte, OU=Thawte Certification, CN=Thawte Timestamping CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x62e562aabc48cf00 C=DE, Email=info@win-unattended.de, CN=Win-Unattended 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3be670c1bd02a900 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x646e3fe3ba08df00 C=US, O=MSFT, CN=Microsoft Authenticode(tm) Root Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x47e5a682fd46a2ab CN=10.1.30.106 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xece4e4289e08b900 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc2a1c04d38e7b800 CN=DSA Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x43a9cc371ff5385a O=Microsoft Trust Network, OU=Microsoft Corporation, OU=Microsoft Time Stamping Service Root, OU=Copyright (c) 1997 Microsoft Corp. 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x2e2d2c7c68f0202e O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign Time Stamping Service Root, OU=NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc. 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa12b07674f1bf600 C=US, O=AffirmTrust, CN=AffirmTrust Commercial 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x2ca429a5c4c6a700 C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd8dbfb2c27bfb200 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2008 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA - G3 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x61a3a33f81aace00 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Object 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x6b7bdc34cd37bb00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x57ba5395b561bf00 C=BM, O=QuoVadis Limited, OU=Root Certification Authority, CN=QuoVadis Root Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf4fd306318ccda00 C=US, O=GeoTrust Inc., CN=GeoTrust Global CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x83085097e9afdf00 O=Digital Signature Trust Co., CN=DST Root CA X3 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x780679907625cc00 OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa0ee62086758b15d C=US, O=Equifax, OU=Equifax Secure Certificate Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xeae16ef49d40be00 C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd944bca189a00 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x8ff6fc03c1edbd00 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc6fa4243b695b600 C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa3ce8d99e60eda00 C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x560ad29254e89100 C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa671e9fec832b700 C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xa8de7211e13be200 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7ae89c50f0b6a00f C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd45980fbf0a0ac00 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc9edb72b684ba00 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf5cd95e581a4ab00 C=US, O=SecureTrust Corporation, CN=SecureTrust CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xabd0695c5d11d15e C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x6f2ebe0e24cfa600 OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x14018a1bf29e595c C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x35f812d09650dc00 C=FR, O=Certplus, CN=Class 2 Primary CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x9e5bc2d78b6a3636 C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA, Email=premium-server@thawte.com 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7c4fd32ec1b1ce00 C=PL, O=Unizeto Sp. z o.o., CN=Certum CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x16e64d2a56ccf200 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., OU=http://certificates.starfieldtech.com/repository/, CN=Starfield Services Root Certificate Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xb28612a94b4dad00 O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x357a29080824af00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x59faf1086271bf00 C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x466cbc09db88c100 C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x3401b15e3761c700 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2008 VeriSign, Inc. - For authorized use only, CN=VeriSign Universal Root Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7cd4ff7b15b8be00 C=US, O=GeoTrust Inc., CN=GeoTrust Primary Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc30e361765128000 C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x491857ead79dde00 C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xab549401526569d3 L=Internet, O=VeriSign, Inc., OU=VeriSign Commercial Software Publishers CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xb9ff821d139e9bf OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xdc1801b225aea100 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xc2ba72a37dfbe300 C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x8043e4ce150ead00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xf2e6331af7b700 C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x7018ac27aad6b100 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM Group, OU=Admin, CN=WPM Group User Root CA, Email=hostmaster@cryohost.net 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0x5cb87a8c9d279100 CN=WPM Group Root CA 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xe2153043b1a9c00 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM, OU=Admin, CN=WPM Group Root CA, Email=hostmaster@wpminternet.com 140c.1420: supR3HardenedWinIsDesiredRootCA: Adding 0xfbb0faaefac5a900 C=GB, ST=West Sussex, L=Burgess Hill, O=WPM Group, OU=Admin, CN=WPM Group Web Filter CA, Email=hostmaster@cryohost.net 140c.1420: supR3HardenedWinRetrieveTrustedRootCAs: cAdded=62 140c.1420: SUPR3HardenedMain: Load Runtime... 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #1/2: info status: 24202 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #2/2: Unknown Status -5659 (0xffffe9e5) w/ timestamp=0x60353c8e/link. 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supHardenedWinVerifyImageByHandle: -> -5659 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll) WinVerifyTrust 140c.1420: Error (rc=0): 140c.1420: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -5659 (0xffffe9e5) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll: Signature #2/2: Not valid kernel code signature.: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VBoxRT.dll 140c.1420: Error (rc=0): 140c.1420: supR3HardenedMonitor_LdrLoadDll: rejecting 'c:\Program Files\Oracle\VirtualBox\VBoxRT.dll' (c:\Program Files\Oracle\VirtualBox\VBoxRT.dll): rcNt=0xc0000190 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0xc0000190 'c:\Program Files\Oracle\VirtualBox\VBoxRT.dll' 140c.1420: Error -610 in supR3HardenedMainInitRuntime! (enmWhat=4) 140c.1420: LoadLibrary "c:\Program Files\Oracle\VirtualBox/VBoxRT.dll" failed (rc=1790) 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #1/2: info status: 24202 140c.1420: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #2/2: Unknown Status -5659 (0xffffe9e5) w/ timestamp=0x60353ca4/link. 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=00007ffdb0250000 'C:\WINDOWS\system32\rsaenh.dll' 140c.1420: supHardenedWinVerifyImageByHandle: -> -5659 (\Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll) WinVerifyTrust 140c.1420: Error (rc=0): 140c.1420: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -5659 (0xffffe9e5) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll: Signature #2/2: Not valid kernel code signature.: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll 140c.1420: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume4\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll 140c.1420: Error (rc=0): 140c.1420: supR3HardenedMonitor_LdrLoadDll: rejecting 'c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll' (c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll): rcNt=0xc0000190 140c.1420: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0xc0000190 'c:\Program Files\Oracle\VirtualBox\VirtualBoxVM.dll' 1544.142c: supR3HardNtChildWaitFor[2]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 844 ms, the end); 109c.1590: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 2062 ms, the end);