| 3 | | Attached is the error log generated |
| 4 | | |
| 5 | | 658.2624: Log file opened: 5.1.22r115126 g_hStartupLog=000000000000024c g_uNtVerCombined=0x611db110 |
| 6 | | 658.2624: \SystemRoot\System32\ntdll.dll: |
| 7 | | 658.2624: CreationTime: 2017-05-15T11:40:24.977655900Z |
| 8 | | 658.2624: LastWriteTime: 2017-04-28T01:11:49.878278200Z |
| 9 | | 658.2624: ChangeTime: 2017-05-15T11:48:18.514070200Z |
| 10 | | 658.2624: FileAttributes: 0x20 |
| 11 | | 658.2624: Size: 0x1a7100 |
| 12 | | 658.2624: NT Headers: 0xe0 |
| 13 | | 658.2624: Timestamp: 0x590296ce |
| 14 | | 658.2624: Machine: 0x8664 - amd64 |
| 15 | | 658.2624: Timestamp: 0x590296ce |
| 16 | | 658.2624: Image Version: 6.1 |
| 17 | | 658.2624: SizeOfImage: 0x1aa000 (1744896) |
| 18 | | 658.2624: Resource Dir: 0x14e000 LB 0x5a028 |
| 19 | | 658.2624: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 20 | | 658.2624: [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)] |
| 21 | | 658.2624: ProductName: Microsoft® Windows® Operating System |
| 22 | | 658.2624: ProductVersion: 6.1.7601.23796 |
| 23 | | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) |
| 24 | | 658.2624: FileDescription: NT Layer DLL |
| 25 | | 658.2624: \SystemRoot\System32\kernel32.dll: |
| 26 | | 658.2624: CreationTime: 2017-05-15T11:40:25.367655900Z |
| 27 | | 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z |
| 28 | | 658.2624: ChangeTime: 2017-05-15T11:48:23.818079600Z |
| 29 | | 658.2624: FileAttributes: 0x20 |
| 30 | | 658.2624: Size: 0x11c000 |
| 31 | | 658.2624: NT Headers: 0xe0 |
| 32 | | 658.2624: Timestamp: 0x59029713 |
| 33 | | 658.2624: Machine: 0x8664 - amd64 |
| 34 | | 658.2624: Timestamp: 0x59029713 |
| 35 | | 658.2624: Image Version: 6.1 |
| 36 | | 658.2624: SizeOfImage: 0x11f000 (1175552) |
| 37 | | 658.2624: Resource Dir: 0x116000 LB 0x528 |
| 38 | | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 39 | | 658.2624: [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] |
| 40 | | 658.2624: ProductName: Microsoft® Windows® Operating System |
| 41 | | 658.2624: ProductVersion: 6.1.7601.23796 |
| 42 | | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) |
| 43 | | 658.2624: FileDescription: Windows NT BASE API Client DLL |
| 44 | | 658.2624: \SystemRoot\System32\KernelBase.dll: |
| 45 | | 658.2624: CreationTime: 2017-05-15T11:40:27.080155900Z |
| 46 | | 658.2624: LastWriteTime: 2017-04-28T01:10:02.307000000Z |
| 47 | | 658.2624: ChangeTime: 2017-05-15T11:48:23.849279600Z |
| 48 | | 658.2624: FileAttributes: 0x20 |
| 49 | | 658.2624: Size: 0x66800 |
| 50 | | 658.2624: NT Headers: 0xe8 |
| 51 | | 658.2624: Timestamp: 0x59029714 |
| 52 | | 658.2624: Machine: 0x8664 - amd64 |
| 53 | | 658.2624: Timestamp: 0x59029714 |
| 54 | | 658.2624: Image Version: 6.1 |
| 55 | | 658.2624: SizeOfImage: 0x6a000 (434176) |
| 56 | | 658.2624: Resource Dir: 0x68000 LB 0x530 |
| 57 | | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 58 | | 658.2624: [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)] |
| 59 | | 658.2624: ProductName: Microsoft® Windows® Operating System |
| 60 | | 658.2624: ProductVersion: 6.1.7601.23796 |
| 61 | | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) |
| 62 | | 658.2624: FileDescription: Windows NT BASE API Client DLL |
| 63 | | 658.2624: \SystemRoot\System32\apisetschema.dll: |
| 64 | | 658.2624: CreationTime: 2017-05-15T11:40:28.850155900Z |
| 65 | | 658.2624: LastWriteTime: 2017-04-28T01:09:58.126000000Z |
| 66 | | 658.2624: ChangeTime: 2017-05-15T11:48:18.233269700Z |
| 67 | | 658.2624: FileAttributes: 0x20 |
| 68 | | 658.2624: Size: 0x1a00 |
| 69 | | 658.2624: NT Headers: 0xc0 |
| 70 | | 658.2624: Timestamp: 0x590296af |
| 71 | | 658.2624: Machine: 0x8664 - amd64 |
| 72 | | 658.2624: Timestamp: 0x590296af |
| 73 | | 658.2624: Image Version: 6.1 |
| 74 | | 658.2624: SizeOfImage: 0x50000 (327680) |
| 75 | | 658.2624: Resource Dir: 0x30000 LB 0x3f8 |
| 76 | | 658.2624: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 77 | | 658.2624: [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)] |
| 78 | | 658.2624: ProductName: Microsoft® Windows® Operating System |
| 79 | | 658.2624: ProductVersion: 6.1.7601.23796 |
| 80 | | 658.2624: FileVersion: 6.1.7601.23796 (win7sp1_ldr.170427-1518) |
| 81 | | 658.2624: FileDescription: ApiSet Schema DLL |
| 82 | | 658.2624: Found driver SysPlant (0x1) |
| 83 | | 658.2624: Found driver SymNetS (0x2) |
| 84 | | 658.2624: Found driver SRTSPX (0x2) |
| 85 | | 658.2624: Found driver SymEvent (0x2) |
| 86 | | 658.2624: Found driver SymIRON (0x2) |
| 87 | | 658.2624: supR3HardenedWinFindAdversaries: 0x3 |
| 88 | | 658.2624: \SystemRoot\System32\drivers\SysPlant.sys: |
| 89 | | 658.2624: CreationTime: 2015-04-08T09:25:06.205658700Z |
| 90 | | 658.2624: LastWriteTime: 2015-04-08T09:25:06.205658700Z |
| 91 | | 658.2624: ChangeTime: 2015-04-08T09:25:06.205658700Z |
| 92 | | 658.2624: FileAttributes: 0x20 |
| 93 | | 658.2624: Size: 0x26f40 |
| 94 | | 658.2624: NT Headers: 0x100 |
| 95 | | 658.2624: Timestamp: 0x5413cb4e |
| 96 | | 658.2624: Machine: 0x8664 - amd64 |
| 97 | | 658.2624: Timestamp: 0x5413cb4e |
| 98 | | 658.2624: Image Version: 5.0 |
| 99 | | 658.2624: SizeOfImage: 0x2d000 (184320) |
| 100 | | 658.2624: Resource Dir: 0x2b000 LB 0x498 |
| 101 | | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 102 | | 658.2624: [Raw version resource data: 0x2b0b8 LB 0x3e0, codepage 0x4e4 (reserved 0x0)] |
| 103 | | 658.2624: ProductName: Symantec CMC Firewall |
| 104 | | 658.2624: ProductVersion: 12.1.5337.5000 |
| 105 | | 658.2624: FileVersion: 12.1.5337.5000 |
| 106 | | 658.2624: FileDescription: Symantec CMC Firewall SysPlant |
| 107 | | 658.2624: \SystemRoot\System32\sysfer.dll: |
| 108 | | 658.2624: CreationTime: 2015-04-08T09:25:06.200658700Z |
| 109 | | 658.2624: LastWriteTime: 2015-04-08T09:25:06.200658700Z |
| 110 | | 658.2624: ChangeTime: 2015-04-08T09:25:06.200658700Z |
| 111 | | 658.2624: FileAttributes: 0x20 |
| 112 | | 658.2624: Size: 0x70f60 |
| 113 | | 658.2624: NT Headers: 0xe8 |
| 114 | | 658.2624: Timestamp: 0x5413cb55 |
| 115 | | 658.2624: Machine: 0x8664 - amd64 |
| 116 | | 658.2624: Timestamp: 0x5413cb55 |
| 117 | | 658.2624: Image Version: 0.0 |
| 118 | | 658.2624: SizeOfImage: 0x88000 (557056) |
| 119 | | 658.2624: Resource Dir: 0x86000 LB 0x630 |
| 120 | | 658.2624: [Version info resource found at 0xc8! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 121 | | 658.2624: [Raw version resource data: 0x86100 LB 0x3d4, codepage 0x4e4 (reserved 0x0)] |
| 122 | | 658.2624: ProductName: Symantec CMC Firewall |
| 123 | | 658.2624: ProductVersion: 12.1.5337.5000 |
| 124 | | 658.2624: FileVersion: 12.1.5337.5000 |
| 125 | | 658.2624: FileDescription: Symantec CMC Firewall sysfer |
| 126 | | 658.2624: \SystemRoot\System32\drivers\symevent64x86.sys: |
| 127 | | 658.2624: CreationTime: 2015-04-08T09:25:49.025658700Z |
| 128 | | 658.2624: LastWriteTime: 2015-06-02T08:16:03.334057100Z |
| 129 | | 658.2624: ChangeTime: 2015-06-02T08:16:03.334057100Z |
| 130 | | 658.2624: FileAttributes: 0x20 |
| 131 | | 658.2624: Size: 0x2b658 |
| 132 | | 658.2624: NT Headers: 0xe8 |
| 133 | | 658.2624: Timestamp: 0x51f32ff2 |
| 134 | | 658.2624: Machine: 0x8664 - amd64 |
| 135 | | 658.2624: Timestamp: 0x51f32ff2 |
| 136 | | 658.2624: Image Version: 6.0 |
| 137 | | 658.2624: SizeOfImage: 0x38000 (229376) |
| 138 | | 658.2624: Resource Dir: 0x36000 LB 0x3c8 |
| 139 | | 658.2624: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] |
| 140 | | 658.2624: [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] |
| 141 | | 658.2624: ProductName: SYMEVENT |
| 142 | | 658.2624: ProductVersion: 12.9.5.2 |
| 143 | | 658.2624: FileVersion: 12.9.5.2 |
| 144 | | 658.2624: FileDescription: Symantec Event Library |
| 145 | | 658.2624: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' |
| 146 | | 658.2624: Calling main() |
| 147 | | 658.2624: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 |
| 148 | | 658.2624: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' |
| 149 | | 658.2624: SUPR3HardenedMain: Respawn #1 |
| 150 | | 658.2624: System32: \Device\HarddiskVolume2\Windows\System32 |
| 151 | | 658.2624: WinSxS: \Device\HarddiskVolume2\Windows\winsxs |
| 152 | | 658.2624: KnownDllPath: C:\Windows\system32 |
| 153 | | 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports |
| 154 | | 658.2624: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) |
| 155 | | 658.2624: supR3HardNtEnableThreadCreation: |
| 156 | | 658.2624: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f3a360 pvNtTerminateThread=0000000076f5c260 |
| 157 | | 658.2624: supR3HardenedWinDoReSpawn(1): New child 15a4.5e8 [kernel32]. |
| 158 | | 658.2624: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdf000 cbPeb=0x380 |
| 159 | | 658.2624: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f10000 uNtDllChildAddr=0000000076f10000 |
| 160 | | 658.2624: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f3a360 |
| 161 | | 658.2624: supR3HardenedWinSetupChildInit: Start child. |
| 162 | | 658.2624: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. |
| 163 | | 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps |
| 164 | | 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION |
| 165 | | 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 |
| 166 | | 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 |
| 167 | | 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 |
| 168 | | 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 |
| 169 | | 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 |
| 170 | | 658.2624: 0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000 |
| 171 | | 658.2624: *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !! |
| 172 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000) |
| 173 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000] |
| 174 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x1c0000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 175 | | 658.2624: 0000000000061000-000000000021ffff 0x0001/0x0000 0x0000000 |
| 176 | | 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 |
| 177 | | 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 |
| 178 | | 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 |
| 179 | | 658.2624: 0000000000320000-0000000071a9ffff 0x0001/0x0000 0x0000000 |
| 180 | | 658.2624: *0000000071aa0000-0000000071aa0fff 0x0040/0x0040 0x0020000 !! |
| 181 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071aa0000 (LB 0x1000, 0000000071aa0000 LB 0x1000) |
| 182 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071aa0000/0000000071aa0000 LB 0/0x1000] |
| 183 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071aa0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 184 | | 658.2624: 0000000071aa1000-0000000071aaffff 0x0001/0x0000 0x0000000 |
| 185 | | 658.2624: *0000000071ab0000-0000000071ab0fff 0x0040/0x0040 0x0020000 !! |
| 186 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ab0000 (LB 0x1000, 0000000071ab0000 LB 0x1000) |
| 187 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ab0000/0000000071ab0000 LB 0/0x1000] |
| 188 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ab0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 189 | | 658.2624: 0000000071ab1000-0000000071abffff 0x0001/0x0000 0x0000000 |
| 190 | | 658.2624: *0000000071ac0000-0000000071ac0fff 0x0040/0x0040 0x0020000 !! |
| 191 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ac0000 (LB 0x1000, 0000000071ac0000 LB 0x1000) |
| 192 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ac0000/0000000071ac0000 LB 0/0x1000] |
| 193 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ac0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 194 | | 658.2624: 0000000071ac1000-0000000071acffff 0x0001/0x0000 0x0000000 |
| 195 | | 658.2624: *0000000071ad0000-0000000071ad0fff 0x0040/0x0040 0x0020000 !! |
| 196 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ad0000 (LB 0x1000, 0000000071ad0000 LB 0x1000) |
| 197 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ad0000/0000000071ad0000 LB 0/0x1000] |
| 198 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ad0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 199 | | 658.2624: 0000000071ad1000-0000000071adffff 0x0001/0x0000 0x0000000 |
| 200 | | 658.2624: *0000000071ae0000-0000000071ae0fff 0x0040/0x0040 0x0020000 !! |
| 201 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ae0000 (LB 0x1000, 0000000071ae0000 LB 0x1000) |
| 202 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ae0000/0000000071ae0000 LB 0/0x1000] |
| 203 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ae0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 204 | | 658.2624: 0000000071ae1000-0000000071aeffff 0x0001/0x0000 0x0000000 |
| 205 | | 658.2624: *0000000071af0000-0000000071af0fff 0x0040/0x0040 0x0020000 !! |
| 206 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071af0000 (LB 0x1000, 0000000071af0000 LB 0x1000) |
| 207 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071af0000/0000000071af0000 LB 0/0x1000] |
| 208 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071af0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 209 | | 658.2624: 0000000071af1000-0000000071afffff 0x0001/0x0000 0x0000000 |
| 210 | | 658.2624: *0000000071b00000-0000000071b00fff 0x0040/0x0040 0x0020000 !! |
| 211 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071b00000 (LB 0x1000, 0000000071b00000 LB 0x1000) |
| 212 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071b00000/0000000071b00000 LB 0/0x1000] |
| 213 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071b00000 LB 0x5410000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 214 | | 658.2624: 0000000071b01000-0000000076f0ffff 0x0001/0x0000 0x0000000 |
| 215 | | 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 216 | | 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 217 | | 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 218 | | 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 219 | | 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 220 | | 658.2624: 0000000077048000-000000007704afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 221 | | 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 222 | | 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 |
| 223 | | 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 |
| 224 | | 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 |
| 225 | | 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 |
| 226 | | 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 |
| 227 | | 658.2624: *000000013fde0000-000000013fde0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 228 | | 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 229 | | 658.2624: 000000013fe51000-000000013fe51fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 230 | | 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 231 | | 658.2624: 000000013fe97000-000000013fe97fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 232 | | 658.2624: 000000013fe98000-000000013fe98fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 233 | | 658.2624: 000000013fe99000-000000013fe9dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 234 | | 658.2624: 000000013fe9e000-000000013fe9efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 235 | | 658.2624: 000000013fe9f000-000000013fe9ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 236 | | 658.2624: 000000013fea0000-000000013fea3fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 237 | | 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 238 | | 658.2624: 000000013feec000-000000013feeffff 0x0001/0x0000 0x0000000 |
| 239 | | 658.2624: *000000013fef0000-000000013fef0fff 0x0040/0x0040 0x0020000 !! |
| 240 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fef0000 (LB 0x1000, 000000013fef0000 LB 0x1000) |
| 241 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fef0000/000000013fef0000 LB 0/0x1000] |
| 242 | | 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fef0000 LB 0x7fdbf340000 s=0x10000 ap=0x0 rp=0x00000000000001 |
| 243 | | 658.2624: 000000013fef1000-000007feff22ffff 0x0001/0x0000 0x0000000 |
| 244 | | 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll |
| 245 | | 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 |
| 246 | | 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 |
| 247 | | 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 |
| 248 | | 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 |
| 249 | | 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 |
| 250 | | 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 |
| 251 | | 658.2624: apisetschema.dll: timestamp 0x590296af (rc=VINF_SUCCESS) |
| 252 | | 658.2624: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS) |
| 253 | | 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports |
| 254 | | 658.2624: VirtualBox.exe: Differences in section #0 (headers) between file and memory: |
| 255 | | 658.2624: 000000013fde0162 / 0x0000162: 00 != 11 |
| 256 | | 658.2624: 000000013fde0164 / 0x0000164: 00 != b8 |
| 257 | | 658.2624: 000000013fde0165 / 0x0000165: 00 != 01 |
| 258 | | 658.2624: 000000013fde01b8 / 0x00001b8: 00 != b8 |
| 259 | | 658.2624: 000000013fde01b9 / 0x00001b9: 00 != 01 |
| 260 | | 658.2624: 000000013fde01ba / 0x00001ba: 00 != 11 |
| 261 | | 658.2624: 000000013fde01bc / 0x00001bc: 00 != 20 |
| 262 | | 658.2624: Restored 0x400 bytes of original file content at 000000013fde0000 |
| 263 | | 658.2624: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports |
| 264 | | 658.2624: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports |
| 265 | | 658.2624: ntdll.dll: Differences in section #1 (.text) between file and memory: |
| 266 | | 658.2624: 0000000076f5d540 / 0x004d540: 4c != e9 |
| 267 | | 658.2624: 0000000076f5d541 / 0x004d541: 8b != bb |
| 268 | | 658.2624: 0000000076f5d542 / 0x004d542: d1 != 2a |
| 269 | | 658.2624: 0000000076f5d543 / 0x004d543: b8 != b4 |
| 270 | | 658.2624: 0000000076f5d544 / 0x004d544: 7e != fa |
| 271 | | 658.2624: Restored 0x2000 bytes of original file content at 0000000076f5c36e |
| 272 | | 658.2624: supR3HardNtChildPurify: cFixes=11 g_fSupAdversaries=0x3 cPatchCount=0 |
| 273 | | 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps |
| 274 | | 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION |
| 275 | | 658.2624: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 |
| 276 | | 658.2624: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 |
| 277 | | 658.2624: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 |
| 278 | | 658.2624: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 |
| 279 | | 658.2624: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 |
| 280 | | 658.2624: 0000000000041000-000000000021ffff 0x0001/0x0000 0x0000000 |
| 281 | | 658.2624: *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 |
| 282 | | 658.2624: 000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 |
| 283 | | 658.2624: 000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 |
| 284 | | 658.2624: 0000000000320000-0000000076f0ffff 0x0001/0x0000 0x0000000 |
| 285 | | 658.2624: *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 286 | | 658.2624: 0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 287 | | 658.2624: 000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 288 | | 658.2624: 000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 289 | | 658.2624: 0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 290 | | 658.2624: 0000000077048000-0000000077048fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 291 | | 658.2624: 0000000077049000-000000007704afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 292 | | 658.2624: 000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll |
| 293 | | 658.2624: 00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 |
| 294 | | 658.2624: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 |
| 295 | | 658.2624: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 |
| 296 | | 658.2624: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 |
| 297 | | 658.2624: 000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 |
| 298 | | 658.2624: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 299 | | 658.2624: 000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 300 | | 658.2624: 000000013fe51000-000000013fe51fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 301 | | 658.2624: 000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 302 | | 658.2624: 000000013fe97000-000000013fea3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 303 | | 658.2624: 000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe |
| 304 | | 658.2624: 000000013feec000-000007feff22ffff 0x0001/0x0000 0x0000000 |
| 305 | | 658.2624: *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll |
| 306 | | 658.2624: 000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 |
| 307 | | 658.2624: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 |
| 308 | | 658.2624: 000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 |
| 309 | | 658.2624: *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 |
| 310 | | 658.2624: *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 |
| 311 | | 658.2624: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 |
| 312 | | 658.2624: supR3HardNtChildPurify: Done after 4786 ms and 11 fixes (loop #1). |
| 313 | | 658.2624: supR3HardNtEnableThreadCreation: |
| 314 | | 15a4.5e8: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100 |
| 315 | | 15a4.5e8: supR3HardenedVmProcessInit: uNtDllAddr=0000000076f10000 g_uNtVerCombined=0x611db100 |
| 316 | | 15a4.5e8: ntdll.dll: timestamp 0x590296ce (rc=VINF_SUCCESS) |
| 317 | | 15a4.5e8: New simple heap: #1 0000000000320000 LB 0x400000 (for 1744896 allocation) |
| 318 | | 15a4.5e8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' |
| 319 | | 15a4.5e8: System32: \Device\HarddiskVolume2\Windows\System32 |
| 320 | | 15a4.5e8: WinSxS: \Device\HarddiskVolume2\Windows\winsxs |
| 321 | | 15a4.5e8: KnownDllPath: C:\Windows\system32 |
| 322 | | 15a4.5e8: supR3HardenedVmProcessInit: Opening vboxdrv stub... |
| 323 | | 15a4.5e8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... |
| 324 | | 15a4.5e8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... |
| 325 | | 15a4.5e8: Registered Dll notification callback with NTDLL. |
| 326 | | 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) |
| 327 | | 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll |
| 328 | | 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling] |
| 329 | | 15a4.5e8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] |
| 330 | | 15a4.5e8: supR3HardenedDllNotificationCallback: load 0000000076df0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0] |
| 331 | | 15a4.5e8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] |
| 332 | | 15a4.5e8: supR3HardenedDllNotificationCallback: load 000007fefcc60000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0] |
| 333 | | 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) |
| 334 | | 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll |
| 335 | | 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076df0000 'C:\Windows\system32\kernel32.dll' |
| 336 | | 658.2624: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 796 ms, CloseEvents); |
| 337 | | |
| 338 | | |
| 339 | | Robert |
| | 3 | (removed pasted log) |