VirtualBox

Ticket #14417: VBoxStartup.log

File VBoxStartup.log, 52.5 KB (added by TV, 9 years ago)

VM VirtualBox Startup Log

Line 
18a8.12d4: Log file opened: 5.0.0r101573 g_hStartupLog=00000058 g_uNtVerCombined=0xa0280000
28a8.12d4: \SystemRoot\System32\ntdll.dll:
38a8.12d4: CreationTime: 2015-07-24T03:23:33.225736800Z
48a8.12d4: LastWriteTime: 2015-07-24T03:23:33.241361000Z
58a8.12d4: ChangeTime: 2015-07-24T03:25:49.491626600Z
68a8.12d4: FileAttributes: 0x20
78a8.12d4: Size: 0x176c38
88a8.12d4: NT Headers: 0xf0
98a8.12d4: Timestamp: 0x55a85cc1
108a8.12d4: Machine: 0x14c - i386
118a8.12d4: Timestamp: 0x55a85cc1
128a8.12d4: Image Version: 10.0
138a8.12d4: SizeOfImage: 0x179000 (1544192)
148a8.12d4: Resource Dir: 0x10e000 LB 0x65720
158a8.12d4: ProductName: Microsoft® Windows® Operating System
168a8.12d4: ProductVersion: 10.0.10240.16392
178a8.12d4: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608)
188a8.12d4: FileDescription: NT Layer DLL
198a8.12d4: \SystemRoot\System32\kernel32.dll:
208a8.12d4: CreationTime: 2015-07-10T08:24:38.139724700Z
218a8.12d4: LastWriteTime: 2015-07-10T08:24:38.139724700Z
228a8.12d4: ChangeTime: 2015-07-24T02:59:37.566677800Z
238a8.12d4: FileAttributes: 0x20
248a8.12d4: Size: 0x986b8
258a8.12d4: NT Headers: 0xf8
268a8.12d4: Timestamp: 0x559f3b86
278a8.12d4: Machine: 0x14c - i386
288a8.12d4: Timestamp: 0x559f3b86
298a8.12d4: Image Version: 10.0
308a8.12d4: SizeOfImage: 0x95000 (610304)
318a8.12d4: Resource Dir: 0x8f000 LB 0x518
328a8.12d4: ProductName: Microsoft® Windows® Operating System
338a8.12d4: ProductVersion: 10.0.10240.16384
348a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700)
358a8.12d4: FileDescription: Windows NT BASE API Client DLL
368a8.12d4: \SystemRoot\System32\KernelBase.dll:
378a8.12d4: CreationTime: 2015-07-10T08:24:56.031660300Z
388a8.12d4: LastWriteTime: 2015-07-10T08:24:56.047288800Z
398a8.12d4: ChangeTime: 2015-07-24T02:59:37.707301500Z
408a8.12d4: FileAttributes: 0x20
418a8.12d4: Size: 0x175610
428a8.12d4: NT Headers: 0xf0
438a8.12d4: Timestamp: 0x559f3b4c
448a8.12d4: Machine: 0x14c - i386
458a8.12d4: Timestamp: 0x559f3b4c
468a8.12d4: Image Version: 10.0
478a8.12d4: SizeOfImage: 0x177000 (1536000)
488a8.12d4: Resource Dir: 0x15b000 LB 0x530
498a8.12d4: ProductName: Microsoft® Windows® Operating System
508a8.12d4: ProductVersion: 10.0.10240.16384
518a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700)
528a8.12d4: FileDescription: Windows NT BASE API Client DLL
538a8.12d4: \SystemRoot\System32\apisetschema.dll:
548a8.12d4: CreationTime: 2015-07-10T08:24:49.281165400Z
558a8.12d4: LastWriteTime: 2015-07-10T08:24:49.281165400Z
568a8.12d4: ChangeTime: 2015-07-24T02:59:29.910411200Z
578a8.12d4: FileAttributes: 0x20
588a8.12d4: Size: 0x16560
598a8.12d4: NT Headers: 0xc8
608a8.12d4: Timestamp: 0x559f4063
618a8.12d4: Machine: 0x14c - i386
628a8.12d4: Timestamp: 0x559f4063
638a8.12d4: Image Version: 10.0
648a8.12d4: SizeOfImage: 0x17000 (94208)
658a8.12d4: Resource Dir: 0x16000 LB 0x3f0
668a8.12d4: ProductName: Microsoft® Windows® Operating System
678a8.12d4: ProductVersion: 10.0.10240.16384
688a8.12d4: FileVersion: 10.0.10240.16384 (th1.150709-1700)
698a8.12d4: FileDescription: ApiSet Schema DLL
708a8.12d4: NtOpenDirectoryObject failed on \Driver: 0xc0000022
718a8.12d4: supR3HardenedWinFindAdversaries: 0x80
728a8.12d4: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
738a8.12d4: CreationTime: 2015-07-29T17:54:56.857320100Z
748a8.12d4: LastWriteTime: 2015-07-29T17:57:10.621467300Z
758a8.12d4: ChangeTime: 2015-07-29T17:57:10.621467300Z
768a8.12d4: FileAttributes: 0x20
778a8.12d4: Size: 0x180d8
788a8.12d4: NT Headers: 0xe0
798a8.12d4: Timestamp: 0x552c18fe
808a8.12d4: Machine: 0x14c - i386
818a8.12d4: Timestamp: 0x552c18fe
828a8.12d4: Image Version: 6.1
838a8.12d4: SizeOfImage: 0x1c000 (114688)
848a8.12d4: Resource Dir: 0x1a000 LB 0x3f0
858a8.12d4: ProductName: Malwarebytes Anti-Malware
868a8.12d4: ProductVersion: 0.2.22.0
878a8.12d4: FileVersion: 0.2.22.0
888a8.12d4: FileDescription: Malwarebytes Anti-Malware
898a8.12d4: \SystemRoot\System32\drivers\mwac.sys:
908a8.12d4: CreationTime: 2015-07-29T17:54:25.761614300Z
918a8.12d4: LastWriteTime: 2015-06-18T15:41:58.000000000Z
928a8.12d4: ChangeTime: 2015-07-29T17:54:25.822618100Z
938a8.12d4: FileAttributes: 0x20
948a8.12d4: Size: 0xcad8
958a8.12d4: NT Headers: 0xe8
968a8.12d4: Timestamp: 0x53a0f437
978a8.12d4: Machine: 0x14c - i386
988a8.12d4: Timestamp: 0x53a0f437
998a8.12d4: Image Version: 6.2
1008a8.12d4: SizeOfImage: 0xf000 (61440)
1018a8.12d4: Resource Dir: 0xd000 LB 0x3e0
1028a8.12d4: ProductName: Malwarebytes Web Access Control
1038a8.12d4: ProductVersion: 1.0.6.0
1048a8.12d4: FileVersion: 1.0.6.0
1058a8.12d4: FileDescription: Malwarebytes Web Access Control
1068a8.12d4: \SystemRoot\System32\drivers\mbamchameleon.sys:
1078a8.12d4: CreationTime: 2015-07-29T17:54:25.826617800Z
1088a8.12d4: LastWriteTime: 2015-06-18T15:41:42.000000000Z
1098a8.12d4: ChangeTime: 2015-07-29T17:54:25.943624500Z
1108a8.12d4: FileAttributes: 0x20
1118a8.12d4: Size: 0x172d8
1128a8.12d4: NT Headers: 0xd0
1138a8.12d4: Timestamp: 0x554cf747
1148a8.12d4: Machine: 0x14c - i386
1158a8.12d4: Timestamp: 0x554cf747
1168a8.12d4: Image Version: 6.1
1178a8.12d4: SizeOfImage: 0x1b000 (110592)
1188a8.12d4: Resource Dir: 0x18000 LB 0xbd8
1198a8.12d4: ProductName: Malwarebytes Chameleon
1208a8.12d4: ProductVersion: 1.1.20.0
1218a8.12d4: FileVersion: 1.1.20.0
1228a8.12d4: FileDescription: Malwarebytes Chameleon Protection Driver
1238a8.12d4: \SystemRoot\System32\drivers\mbam.sys:
1248a8.12d4: CreationTime: 2015-07-29T17:54:25.702610600Z
1258a8.12d4: LastWriteTime: 2015-06-18T15:41:36.000000000Z
1268a8.12d4: ChangeTime: 2015-07-29T17:54:25.758613500Z
1278a8.12d4: FileAttributes: 0x20
1288a8.12d4: Size: 0x5ad8
1298a8.12d4: NT Headers: 0xd8
1308a8.12d4: Timestamp: 0x540754db
1318a8.12d4: Machine: 0x14c - i386
1328a8.12d4: Timestamp: 0x540754db
1338a8.12d4: Image Version: 6.1
1348a8.12d4: SizeOfImage: 0x9000 (36864)
1358a8.12d4: Resource Dir: 0x7000 LB 0x3d0
1368a8.12d4: ProductName: Malwarebytes Anti-Malware
1378a8.12d4: ProductVersion: 0.1.15.0
1388a8.12d4: FileVersion: 0.1.15.0
1398a8.12d4: FileDescription: Malwarebytes Anti-Malware
1408a8.12d4: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
1418a8.12d4: Calling main()
1428a8.12d4: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
1438a8.12d4: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
1448a8.12d4: SUPR3HardenedMain: Respawn #1
1458a8.12d4: System32: \Device\HarddiskVolume2\Windows\System32
1468a8.12d4: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS
1478a8.12d4: KnownDllPath: C:\WINDOWS\system32
1488a8.12d4: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
1498a8.12d4: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
1508a8.12d4: supR3HardNtEnableThreadCreation:
1518a8.12d4: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10
1528a8.12d4: supR3HardenedWinDoReSpawn(1): New child 1f58.120c [kernel32].
1538a8.12d4: supR3HardNtChildGatherData: PebBaseAddress=7f8c9000 cbPeb=0x250
1548a8.12d4: supR3HardNtPuChFindNtdll: uNtDllParentAddr=77120000 uNtDllChildAddr=77120000
1558a8.12d4: supR3HardenedWinSetupChildInit: uLdrInitThunk=77192e70
1568a8.12d4: supR3HardenedWinSetupChildInit: Start child.
1578a8.12d4: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
1588a8.12d4: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 0 sleeps
1598a8.12d4: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
1608a8.12d4: *00000000-ff96ffff 0x0001/0x0000 0x0000000
1618a8.12d4: *00690000-0066ffff 0x0004/0x0004 0x0020000
1628a8.12d4: *006b0000-0069bfff 0x0002/0x0002 0x0040000
1638a8.12d4: 006c4000-006b7fff 0x0001/0x0000 0x0000000
1648a8.12d4: *006d0000-005d2fff 0x0000/0x0004 0x0020000
1658a8.12d4: 007cd000-007cafff 0x0104/0x0004 0x0020000
1668a8.12d4: 007cf000-007cdfff 0x0004/0x0004 0x0020000
1678a8.12d4: *007d0000-007cbfff 0x0002/0x0002 0x0040000
1688a8.12d4: 007d4000-007c7fff 0x0001/0x0000 0x0000000
1698a8.12d4: *007e0000-007ddfff 0x0004/0x0004 0x0020000
1708a8.12d4: 007e2000-00123fff 0x0001/0x0000 0x0000000
1718a8.12d4: *00ea0000-00ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1728a8.12d4: 00ea1000-00f16fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1738a8.12d4: 00f17000-00f17fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1748a8.12d4: 00f18000-00f51fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1758a8.12d4: 00f52000-00f52fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1768a8.12d4: 00f53000-00f53fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1778a8.12d4: 00f54000-00f54fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1788a8.12d4: 00f55000-00f55fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1798a8.12d4: 00f56000-00f57fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1808a8.12d4: 00f58000-00f5afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1818a8.12d4: 00f5b000-00f9efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
1828a8.12d4: 00f9f000-8ae1dfff 0x0001/0x0000 0x0000000
1838a8.12d4: *77120000-77120fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1848a8.12d4: 77121000-77225fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1858a8.12d4: 77226000-7722afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1868a8.12d4: 7722b000-7722bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1878a8.12d4: 7722c000-7722dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1888a8.12d4: 7722e000-77298fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
1898a8.12d4: 77299000-6ec91fff 0x0001/0x0000 0x0000000
1908a8.12d4: *7f8a0000-7f87cfff 0x0002/0x0002 0x0040000
1918a8.12d4: 7f8c3000-7f8bcfff 0x0001/0x0000 0x0000000
1928a8.12d4: *7f8c9000-7f8c7fff 0x0004/0x0004 0x0020000
1938a8.12d4: 7f8ca000-7f8c4fff 0x0001/0x0000 0x0000000
1948a8.12d4: *7f8cf000-7f8cdfff 0x0004/0x0004 0x0020000
1958a8.12d4: 7f8d0000-7f1bffff 0x0001/0x0000 0x0000000
1968a8.12d4: *7ffe0000-7ffdefff 0x0002/0x0002 0x0020000
1978a8.12d4: 7ffe1000-7ffd1fff 0x0001/0x0002 0x0020000
1988a8.12d4: VirtualBox.exe: timestamp 0x559e4a2c (rc=VINF_SUCCESS)
1998a8.12d4: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
2008a8.12d4: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports
2018a8.12d4: supR3HardNtChildPurify: Done after 609 ms and 0 fixes (loop #0).
2021f58.120c: Log file opened: 5.0.0r101573 g_hStartupLog=00000004 g_uNtVerCombined=0xa0280000
2031f58.120c: supR3HardenedVmProcessInit: uNtDllAddr=77120000
2048a8.12d4: supR3HardNtEnableThreadCreation:
2051f58.120c: ntdll.dll: timestamp 0x55a85cc1 (rc=VINF_SUCCESS)
2061f58.120c: New simple heap: #1 008f0000 LB 0x400000 (for 1544192 allocation)
2071f58.120c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
2081f58.120c: System32: \Device\HarddiskVolume2\Windows\System32
2091f58.120c: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS
2101f58.120c: KnownDllPath: C:\WINDOWS\system32
2111f58.120c: supR3HardenedVmProcessInit: Opening vboxdrv stub...
2121f58.120c: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
2131f58.120c: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
2141f58.120c: Registered Dll notification callback with NTDLL.
2151f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll)
2161f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll
2171f58.120c: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=00000801:<flags> [calling]
2181f58.120c: supR3HardenedDllNotificationCallback: load 74820000 LB 0x00177000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0]
2191f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll)
2201f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
2211f58.120c: supR3HardenedDllNotificationCallback: load 74f40000 LB 0x00095000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0]
2221f58.120c: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
2231f58.120c: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\KERNEL32.DLL'
2241f58.120c: supR3HardenedDllNotificationCallback: load 00ea0000 LB 0x000ff000 C:\Program Files\Oracle\VirtualBox\VirtualBox.exe [fFlags=0x0]
2251f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
2261f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
2271f58.120c: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
2281f58.120c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10
2298a8.12d4: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 218 ms.
2301f58.120c: \SystemRoot\System32\ntdll.dll:
2311f58.120c: CreationTime: 2015-07-24T03:23:33.225736800Z
2321f58.120c: LastWriteTime: 2015-07-24T03:23:33.241361000Z
2331f58.120c: ChangeTime: 2015-07-24T03:25:49.491626600Z
2341f58.120c: FileAttributes: 0x20
2351f58.120c: Size: 0x176c38
2361f58.120c: NT Headers: 0xf0
2371f58.120c: Timestamp: 0x55a85cc1
2381f58.120c: Machine: 0x14c - i386
2391f58.120c: Timestamp: 0x55a85cc1
2401f58.120c: Image Version: 10.0
2411f58.120c: SizeOfImage: 0x179000 (1544192)
2421f58.120c: Resource Dir: 0x10e000 LB 0x65720
2431f58.120c: ProductName: Microsoft® Windows® Operating System
2441f58.120c: ProductVersion: 10.0.10240.16392
2451f58.120c: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608)
2461f58.120c: FileDescription: NT Layer DLL
2471f58.120c: \SystemRoot\System32\kernel32.dll:
2481f58.120c: CreationTime: 2015-07-10T08:24:38.139724700Z
2491f58.120c: LastWriteTime: 2015-07-10T08:24:38.139724700Z
2501f58.120c: ChangeTime: 2015-07-24T02:59:37.566677800Z
2511f58.120c: FileAttributes: 0x20
2521f58.120c: Size: 0x986b8
2531f58.120c: NT Headers: 0xf8
2541f58.120c: Timestamp: 0x559f3b86
2551f58.120c: Machine: 0x14c - i386
2561f58.120c: Timestamp: 0x559f3b86
2571f58.120c: Image Version: 10.0
2581f58.120c: SizeOfImage: 0x95000 (610304)
2591f58.120c: Resource Dir: 0x8f000 LB 0x518
2601f58.120c: ProductName: Microsoft® Windows® Operating System
2611f58.120c: ProductVersion: 10.0.10240.16384
2621f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700)
2631f58.120c: FileDescription: Windows NT BASE API Client DLL
2641f58.120c: \SystemRoot\System32\KernelBase.dll:
2651f58.120c: CreationTime: 2015-07-10T08:24:56.031660300Z
2661f58.120c: LastWriteTime: 2015-07-10T08:24:56.047288800Z
2671f58.120c: ChangeTime: 2015-07-24T02:59:37.707301500Z
2681f58.120c: FileAttributes: 0x20
2691f58.120c: Size: 0x175610
2701f58.120c: NT Headers: 0xf0
2711f58.120c: Timestamp: 0x559f3b4c
2721f58.120c: Machine: 0x14c - i386
2731f58.120c: Timestamp: 0x559f3b4c
2741f58.120c: Image Version: 10.0
2751f58.120c: SizeOfImage: 0x177000 (1536000)
2761f58.120c: Resource Dir: 0x15b000 LB 0x530
2771f58.120c: ProductName: Microsoft® Windows® Operating System
2781f58.120c: ProductVersion: 10.0.10240.16384
2791f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700)
2801f58.120c: FileDescription: Windows NT BASE API Client DLL
2811f58.120c: \SystemRoot\System32\apisetschema.dll:
2821f58.120c: CreationTime: 2015-07-10T08:24:49.281165400Z
2831f58.120c: LastWriteTime: 2015-07-10T08:24:49.281165400Z
2841f58.120c: ChangeTime: 2015-07-24T02:59:29.910411200Z
2851f58.120c: FileAttributes: 0x20
2861f58.120c: Size: 0x16560
2871f58.120c: NT Headers: 0xc8
2881f58.120c: Timestamp: 0x559f4063
2891f58.120c: Machine: 0x14c - i386
2901f58.120c: Timestamp: 0x559f4063
2911f58.120c: Image Version: 10.0
2921f58.120c: SizeOfImage: 0x17000 (94208)
2931f58.120c: Resource Dir: 0x16000 LB 0x3f0
2941f58.120c: ProductName: Microsoft® Windows® Operating System
2951f58.120c: ProductVersion: 10.0.10240.16384
2961f58.120c: FileVersion: 10.0.10240.16384 (th1.150709-1700)
2971f58.120c: FileDescription: ApiSet Schema DLL
2981f58.120c: NtOpenDirectoryObject failed on \Driver: 0xc0000022
2991f58.120c: supR3HardenedWinFindAdversaries: 0x80
3001f58.120c: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
3011f58.120c: CreationTime: 2015-07-29T17:54:56.857320100Z
3021f58.120c: LastWriteTime: 2015-07-29T17:57:10.621467300Z
3031f58.120c: ChangeTime: 2015-07-29T17:57:10.621467300Z
3041f58.120c: FileAttributes: 0x20
3051f58.120c: Size: 0x180d8
3061f58.120c: NT Headers: 0xe0
3071f58.120c: Timestamp: 0x552c18fe
3081f58.120c: Machine: 0x14c - i386
3091f58.120c: Timestamp: 0x552c18fe
3101f58.120c: Image Version: 6.1
3111f58.120c: SizeOfImage: 0x1c000 (114688)
3121f58.120c: Resource Dir: 0x1a000 LB 0x3f0
3131f58.120c: ProductName: Malwarebytes Anti-Malware
3141f58.120c: ProductVersion: 0.2.22.0
3151f58.120c: FileVersion: 0.2.22.0
3161f58.120c: FileDescription: Malwarebytes Anti-Malware
3171f58.120c: \SystemRoot\System32\drivers\mwac.sys:
3181f58.120c: CreationTime: 2015-07-29T17:54:25.761614300Z
3191f58.120c: LastWriteTime: 2015-06-18T15:41:58.000000000Z
3201f58.120c: ChangeTime: 2015-07-29T17:54:25.822618100Z
3211f58.120c: FileAttributes: 0x20
3221f58.120c: Size: 0xcad8
3231f58.120c: NT Headers: 0xe8
3241f58.120c: Timestamp: 0x53a0f437
3251f58.120c: Machine: 0x14c - i386
3261f58.120c: Timestamp: 0x53a0f437
3271f58.120c: Image Version: 6.2
3281f58.120c: SizeOfImage: 0xf000 (61440)
3291f58.120c: Resource Dir: 0xd000 LB 0x3e0
3301f58.120c: ProductName: Malwarebytes Web Access Control
3311f58.120c: ProductVersion: 1.0.6.0
3321f58.120c: FileVersion: 1.0.6.0
3331f58.120c: FileDescription: Malwarebytes Web Access Control
3341f58.120c: \SystemRoot\System32\drivers\mbamchameleon.sys:
3351f58.120c: CreationTime: 2015-07-29T17:54:25.826617800Z
3361f58.120c: LastWriteTime: 2015-06-18T15:41:42.000000000Z
3371f58.120c: ChangeTime: 2015-07-29T17:54:25.943624500Z
3381f58.120c: FileAttributes: 0x20
3391f58.120c: Size: 0x172d8
3401f58.120c: NT Headers: 0xd0
3411f58.120c: Timestamp: 0x554cf747
3421f58.120c: Machine: 0x14c - i386
3431f58.120c: Timestamp: 0x554cf747
3441f58.120c: Image Version: 6.1
3451f58.120c: SizeOfImage: 0x1b000 (110592)
3461f58.120c: Resource Dir: 0x18000 LB 0xbd8
3471f58.120c: ProductName: Malwarebytes Chameleon
3481f58.120c: ProductVersion: 1.1.20.0
3491f58.120c: FileVersion: 1.1.20.0
3501f58.120c: FileDescription: Malwarebytes Chameleon Protection Driver
3511f58.120c: \SystemRoot\System32\drivers\mbam.sys:
3521f58.120c: CreationTime: 2015-07-29T17:54:25.702610600Z
3531f58.120c: LastWriteTime: 2015-06-18T15:41:36.000000000Z
3541f58.120c: ChangeTime: 2015-07-29T17:54:25.758613500Z
3551f58.120c: FileAttributes: 0x20
3561f58.120c: Size: 0x5ad8
3571f58.120c: NT Headers: 0xd8
3581f58.120c: Timestamp: 0x540754db
3591f58.120c: Machine: 0x14c - i386
3601f58.120c: Timestamp: 0x540754db
3611f58.120c: Image Version: 6.1
3621f58.120c: SizeOfImage: 0x9000 (36864)
3631f58.120c: Resource Dir: 0x7000 LB 0x3d0
3641f58.120c: ProductName: Malwarebytes Anti-Malware
3651f58.120c: ProductVersion: 0.1.15.0
3661f58.120c: FileVersion: 0.1.15.0
3671f58.120c: FileDescription: Malwarebytes Anti-Malware
3681f58.120c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
3691f58.120c: Calling main()
3701f58.120c: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
3711f58.120c: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
3721f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
3731f58.120c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
3741f58.120c: SUPR3HardenedMain: Respawn #2
3751f58.120c: supR3HardNtEnableThreadCreation:
3761f58.120c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10
3771f58.120c: supR3HardenedWinDoReSpawn(2): New child 370.6d0 [kernel32].
3781f58.120c: supR3HardenedWinReSpawn: NtSetInformationThread/ThreadHideFromDebugger failed: 0xc0000022 (harmless)
3791f58.120c: supR3HardNtChildGatherData: PebBaseAddress=7fa14000 cbPeb=0x250
3801f58.120c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=77120000 uNtDllChildAddr=77120000
3811f58.120c: supR3HardenedWinSetupChildInit: uLdrInitThunk=77192e70
3821f58.120c: supR3HardenedWinSetupChildInit: Start child.
3831f58.120c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
3841f58.120c: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 0 sleeps
3851f58.120c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
3861f58.120c: *00000000-ffd8ffff 0x0001/0x0000 0x0000000
3871f58.120c: *00270000-0024ffff 0x0004/0x0004 0x0020000
3881f58.120c: *00290000-0027bfff 0x0002/0x0002 0x0040000
3891f58.120c: 002a4000-00297fff 0x0001/0x0000 0x0000000
3901f58.120c: *002b0000-001b2fff 0x0000/0x0004 0x0020000
3911f58.120c: 003ad000-003aafff 0x0104/0x0004 0x0020000
3921f58.120c: 003af000-003adfff 0x0004/0x0004 0x0020000
3931f58.120c: *003b0000-003abfff 0x0002/0x0002 0x0040000
3941f58.120c: 003b4000-003a7fff 0x0001/0x0000 0x0000000
3951f58.120c: *003c0000-003bdfff 0x0004/0x0004 0x0020000
3961f58.120c: 003c2000-ff8e3fff 0x0001/0x0000 0x0000000
3971f58.120c: *00ea0000-00ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3981f58.120c: 00ea1000-00f16fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3991f58.120c: 00f17000-00f17fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4001f58.120c: 00f18000-00f51fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4011f58.120c: 00f52000-00f52fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4021f58.120c: 00f53000-00f53fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4031f58.120c: 00f54000-00f54fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4041f58.120c: 00f55000-00f55fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4051f58.120c: 00f56000-00f57fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4061f58.120c: 00f58000-00f5afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4071f58.120c: 00f5b000-00f9efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
4081f58.120c: 00f9f000-8ae1dfff 0x0001/0x0000 0x0000000
4091f58.120c: *77120000-77120fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4101f58.120c: 77121000-77225fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4111f58.120c: 77226000-7722afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4121f58.120c: 7722b000-7722bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4131f58.120c: 7722c000-7722dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4141f58.120c: 7722e000-77298fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
4151f58.120c: 77299000-6eb41fff 0x0001/0x0000 0x0000000
4161f58.120c: *7f9f0000-7f9ccfff 0x0002/0x0002 0x0040000
4171f58.120c: 7fa13000-7fa11fff 0x0001/0x0000 0x0000000
4181f58.120c: *7fa14000-7fa12fff 0x0004/0x0004 0x0020000
4191f58.120c: 7fa15000-7fa0afff 0x0001/0x0000 0x0000000
4201f58.120c: *7fa1f000-7fa1dfff 0x0004/0x0004 0x0020000
4211f58.120c: 7fa20000-7f45ffff 0x0001/0x0000 0x0000000
4221f58.120c: *7ffe0000-7ffdefff 0x0002/0x0002 0x0020000
4231f58.120c: 7ffe1000-7ffd1fff 0x0001/0x0002 0x0020000
4241f58.120c: VirtualBox.exe: timestamp 0x559e4a2c (rc=VINF_SUCCESS)
4251f58.120c: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
4261f58.120c: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports
4271f58.120c: supR3HardNtChildPurify: Done after 611 ms and 0 fixes (loop #0).
428370.6d0: Log file opened: 5.0.0r101573 g_hStartupLog=00000004 g_uNtVerCombined=0xa0280000
429370.6d0: supR3HardenedVmProcessInit: uNtDllAddr=77120000
430370.6d0: ntdll.dll: timestamp 0x55a85cc1 (rc=VINF_SUCCESS)
431370.6d0: New simple heap: #1 004d0000 LB 0x400000 (for 1544192 allocation)
4321f58.120c: supR3HardenedEarlyCompact: Removed heap 1 (0x8f0000 LB 0x400000)
4331f58.120c: supR3HardNtEnableThreadCreation:
434370.6d0: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
435370.6d0: System32: \Device\HarddiskVolume2\Windows\System32
436370.6d0: WinSxS: \Device\HarddiskVolume2\Windows\WinSxS
437370.6d0: KnownDllPath: C:\WINDOWS\system32
438370.6d0: supR3HardenedVmProcessInit: Opening vboxdrv...
439370.6d0: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
440370.6d0: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
441370.6d0: Registered Dll notification callback with NTDLL.
442370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll)
443370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll
444370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\KERNEL32.DLL (Input=KERNEL32.DLL, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=00000801:<flags> [calling]
445370.6d0: supR3HardenedDllNotificationCallback: load 74820000 LB 0x00177000 C:\WINDOWS\system32\KERNELBASE.dll [fFlags=0x0]
446370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll)
447370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
448370.6d0: supR3HardenedDllNotificationCallback: load 74f40000 LB 0x00095000 C:\WINDOWS\system32\KERNEL32.DLL [fFlags=0x0]
449370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
450370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\KERNEL32.DLL'
451370.6d0: supR3HardenedDllNotificationCallback: load 00ea0000 LB 0x000ff000 C:\Program Files\Oracle\VirtualBox\VirtualBox.exe [fFlags=0x0]
452370.6d0: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
453370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
454370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
455370.6d0: supR3HardNtDisableThreadCreation: pvLdrInitThunk=77192e70 pvNtTerminateThread=771a0f10
4561f58.120c: supR3HardNtChildWaitFor: Found expected request 1 (CloseEvents) after 237 ms.
457370.6d0: \SystemRoot\System32\ntdll.dll:
458370.6d0: CreationTime: 2015-07-24T03:23:33.225736800Z
459370.6d0: LastWriteTime: 2015-07-24T03:23:33.241361000Z
460370.6d0: ChangeTime: 2015-07-24T03:25:49.491626600Z
461370.6d0: FileAttributes: 0x20
462370.6d0: Size: 0x176c38
463370.6d0: NT Headers: 0xf0
464370.6d0: Timestamp: 0x55a85cc1
465370.6d0: Machine: 0x14c - i386
466370.6d0: Timestamp: 0x55a85cc1
467370.6d0: Image Version: 10.0
468370.6d0: SizeOfImage: 0x179000 (1544192)
469370.6d0: Resource Dir: 0x10e000 LB 0x65720
470370.6d0: ProductName: Microsoft® Windows® Operating System
471370.6d0: ProductVersion: 10.0.10240.16392
472370.6d0: FileVersion: 10.0.10240.16392 (th1_st1.150716-1608)
473370.6d0: FileDescription: NT Layer DLL
474370.6d0: \SystemRoot\System32\kernel32.dll:
475370.6d0: CreationTime: 2015-07-10T08:24:38.139724700Z
476370.6d0: LastWriteTime: 2015-07-10T08:24:38.139724700Z
477370.6d0: ChangeTime: 2015-07-24T02:59:37.566677800Z
478370.6d0: FileAttributes: 0x20
479370.6d0: Size: 0x986b8
480370.6d0: NT Headers: 0xf8
481370.6d0: Timestamp: 0x559f3b86
482370.6d0: Machine: 0x14c - i386
483370.6d0: Timestamp: 0x559f3b86
484370.6d0: Image Version: 10.0
485370.6d0: SizeOfImage: 0x95000 (610304)
486370.6d0: Resource Dir: 0x8f000 LB 0x518
487370.6d0: ProductName: Microsoft® Windows® Operating System
488370.6d0: ProductVersion: 10.0.10240.16384
489370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700)
490370.6d0: FileDescription: Windows NT BASE API Client DLL
491370.6d0: \SystemRoot\System32\KernelBase.dll:
492370.6d0: CreationTime: 2015-07-10T08:24:56.031660300Z
493370.6d0: LastWriteTime: 2015-07-10T08:24:56.047288800Z
494370.6d0: ChangeTime: 2015-07-24T02:59:37.707301500Z
495370.6d0: FileAttributes: 0x20
496370.6d0: Size: 0x175610
497370.6d0: NT Headers: 0xf0
498370.6d0: Timestamp: 0x559f3b4c
499370.6d0: Machine: 0x14c - i386
500370.6d0: Timestamp: 0x559f3b4c
501370.6d0: Image Version: 10.0
502370.6d0: SizeOfImage: 0x177000 (1536000)
503370.6d0: Resource Dir: 0x15b000 LB 0x530
504370.6d0: ProductName: Microsoft® Windows® Operating System
505370.6d0: ProductVersion: 10.0.10240.16384
506370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700)
507370.6d0: FileDescription: Windows NT BASE API Client DLL
508370.6d0: \SystemRoot\System32\apisetschema.dll:
509370.6d0: CreationTime: 2015-07-10T08:24:49.281165400Z
510370.6d0: LastWriteTime: 2015-07-10T08:24:49.281165400Z
511370.6d0: ChangeTime: 2015-07-24T02:59:29.910411200Z
512370.6d0: FileAttributes: 0x20
513370.6d0: Size: 0x16560
514370.6d0: NT Headers: 0xc8
515370.6d0: Timestamp: 0x559f4063
516370.6d0: Machine: 0x14c - i386
517370.6d0: Timestamp: 0x559f4063
518370.6d0: Image Version: 10.0
519370.6d0: SizeOfImage: 0x17000 (94208)
520370.6d0: Resource Dir: 0x16000 LB 0x3f0
521370.6d0: ProductName: Microsoft® Windows® Operating System
522370.6d0: ProductVersion: 10.0.10240.16384
523370.6d0: FileVersion: 10.0.10240.16384 (th1.150709-1700)
524370.6d0: FileDescription: ApiSet Schema DLL
525370.6d0: NtOpenDirectoryObject failed on \Driver: 0xc0000022
526370.6d0: supR3HardenedWinFindAdversaries: 0x80
527370.6d0: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
528370.6d0: CreationTime: 2015-07-29T17:54:56.857320100Z
529370.6d0: LastWriteTime: 2015-07-29T17:57:10.621467300Z
530370.6d0: ChangeTime: 2015-07-29T17:57:10.621467300Z
531370.6d0: FileAttributes: 0x20
532370.6d0: Size: 0x180d8
533370.6d0: NT Headers: 0xe0
534370.6d0: Timestamp: 0x552c18fe
535370.6d0: Machine: 0x14c - i386
536370.6d0: Timestamp: 0x552c18fe
537370.6d0: Image Version: 6.1
538370.6d0: SizeOfImage: 0x1c000 (114688)
539370.6d0: Resource Dir: 0x1a000 LB 0x3f0
540370.6d0: ProductName: Malwarebytes Anti-Malware
541370.6d0: ProductVersion: 0.2.22.0
542370.6d0: FileVersion: 0.2.22.0
543370.6d0: FileDescription: Malwarebytes Anti-Malware
544370.6d0: \SystemRoot\System32\drivers\mwac.sys:
545370.6d0: CreationTime: 2015-07-29T17:54:25.761614300Z
546370.6d0: LastWriteTime: 2015-06-18T15:41:58.000000000Z
547370.6d0: ChangeTime: 2015-07-29T17:54:25.822618100Z
548370.6d0: FileAttributes: 0x20
549370.6d0: Size: 0xcad8
550370.6d0: NT Headers: 0xe8
551370.6d0: Timestamp: 0x53a0f437
552370.6d0: Machine: 0x14c - i386
553370.6d0: Timestamp: 0x53a0f437
554370.6d0: Image Version: 6.2
555370.6d0: SizeOfImage: 0xf000 (61440)
556370.6d0: Resource Dir: 0xd000 LB 0x3e0
557370.6d0: ProductName: Malwarebytes Web Access Control
558370.6d0: ProductVersion: 1.0.6.0
559370.6d0: FileVersion: 1.0.6.0
560370.6d0: FileDescription: Malwarebytes Web Access Control
561370.6d0: \SystemRoot\System32\drivers\mbamchameleon.sys:
562370.6d0: CreationTime: 2015-07-29T17:54:25.826617800Z
563370.6d0: LastWriteTime: 2015-06-18T15:41:42.000000000Z
564370.6d0: ChangeTime: 2015-07-29T17:54:25.943624500Z
565370.6d0: FileAttributes: 0x20
566370.6d0: Size: 0x172d8
567370.6d0: NT Headers: 0xd0
568370.6d0: Timestamp: 0x554cf747
569370.6d0: Machine: 0x14c - i386
570370.6d0: Timestamp: 0x554cf747
571370.6d0: Image Version: 6.1
572370.6d0: SizeOfImage: 0x1b000 (110592)
573370.6d0: Resource Dir: 0x18000 LB 0xbd8
574370.6d0: ProductName: Malwarebytes Chameleon
575370.6d0: ProductVersion: 1.1.20.0
576370.6d0: FileVersion: 1.1.20.0
577370.6d0: FileDescription: Malwarebytes Chameleon Protection Driver
578370.6d0: \SystemRoot\System32\drivers\mbam.sys:
579370.6d0: CreationTime: 2015-07-29T17:54:25.702610600Z
580370.6d0: LastWriteTime: 2015-06-18T15:41:36.000000000Z
581370.6d0: ChangeTime: 2015-07-29T17:54:25.758613500Z
582370.6d0: FileAttributes: 0x20
583370.6d0: Size: 0x5ad8
584370.6d0: NT Headers: 0xd8
585370.6d0: Timestamp: 0x540754db
586370.6d0: Machine: 0x14c - i386
587370.6d0: Timestamp: 0x540754db
588370.6d0: Image Version: 6.1
589370.6d0: SizeOfImage: 0x9000 (36864)
590370.6d0: Resource Dir: 0x7000 LB 0x3d0
591370.6d0: ProductName: Malwarebytes Anti-Malware
592370.6d0: ProductVersion: 0.1.15.0
593370.6d0: FileVersion: 0.1.15.0
594370.6d0: FileDescription: Malwarebytes Anti-Malware
595370.6d0: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
596370.6d0: Calling main()
597370.6d0: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
598370.6d0: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
599370.6d0: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
600370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
601370.6d0: SUPR3HardenedMain: Final process, opening VBoxDrv...
602370.6d0: supR3HardenedEarlyCompact: Removed heap 1 (0x4d0000 LB 0x400000)
603370.6d0: supR3HardNtEnableThreadCreation:
604370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll)
605370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll
606370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801:<flags> [calling]
607370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
608370.6d0: supR3HardenedDllNotificationCallback: load 6c770000 LB 0x00005000 C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL [fFlags=0x0]
609370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
610370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
611370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
612370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
613370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VBoxSupLib.dll [lacks WinVerifyTrust]
614370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
615370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
616370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=6c770000 'C:\Program Files\Oracle\VirtualBox\VBoxSupLib.DLL'
617370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
618370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'msasn1.dll'.
619370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'crypt32.dll'.
620370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #24 'rpcrt4.dll'.
621370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\wintrust.dll)
622370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\wintrust.dll
623370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'rpcrt4.dll'...
624370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'rpcrt4.dll' -> '\Device\HarddiskVolume2\Windows\System32\rpcrt4.dll' [rcNtRedir=0xc0150008]
625370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\rpcrt4.dll)
626370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\rpcrt4.dll
627370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'crypt32.dll'...
628370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'crypt32.dll' -> '\Device\HarddiskVolume2\Windows\System32\crypt32.dll' [rcNtRedir=0xc0150008]
629370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
630370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #27 'msasn1.dll'.
631370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\crypt32.dll)
632370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\crypt32.dll
633370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'...
634370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume2\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008]
635370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\msasn1.dll)
636370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\msasn1.dll
637370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
638370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume2\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
639370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\msvcrt.dll)
640370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\msvcrt.dll
641370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msasn1.dll'...
642370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msasn1.dll' -> '\Device\HarddiskVolume2\Windows\System32\msasn1.dll' [rcNtRedir=0xc0150008]
643370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msasn1.dll [lacks WinVerifyTrust]
644370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'msvcrt.dll'...
645370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'msvcrt.dll' -> '\Device\HarddiskVolume2\Windows\System32\msvcrt.dll' [rcNtRedir=0xc0150008]
646370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
647370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\Wintrust.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801:<flags> [calling]
648370.6d0: supR3HardenedDllNotificationCallback: load 75000000 LB 0x000be000 C:\WINDOWS\system32\msvcrt.dll [fFlags=0x0]
649370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msvcrt.dll [lacks WinVerifyTrust]
650370.6d0: supR3HardenedDllNotificationCallback: load 742d0000 LB 0x0000e000 C:\WINDOWS\system32\MSASN1.dll [fFlags=0x0]
651370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\msasn1.dll [lacks WinVerifyTrust]
652370.6d0: supR3HardenedDllNotificationCallback: load 749a0000 LB 0x00175000 C:\WINDOWS\system32\CRYPT32.dll [fFlags=0x0]
653370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
654370.6d0: supR3HardenedDllNotificationCallback: load 75550000 LB 0x000c2000 C:\WINDOWS\system32\RPCRT4.dll [fFlags=0x0]
655370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rpcrt4.dll [lacks WinVerifyTrust]
656370.6d0: supR3HardenedDllNotificationCallback: load 742f0000 LB 0x00042000 C:\WINDOWS\system32\Wintrust.dll [fFlags=0x0]
657370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
658370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\WINDOWS\system32\Wintrust.dll'
659370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\bcrypt.dll)
660370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\bcrypt.dll
661370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcrypt.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000801:<flags> [calling]
662370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
663370.6d0: supR3HardenedDllNotificationCallback: load 741d0000 LB 0x0001d000 C:\WINDOWS\system32\bcrypt.dll [fFlags=0x0]
664370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
665370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=741d0000 'C:\WINDOWS\system32\bcrypt.dll'
666370.6d0: bcrypt.dll loaded at 741d0000, BCryptOpenAlgorithmProvider at 741d5cc0, preloading providers:
667370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll)
668370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll
669370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\bcryptprimitives.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
670370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
671370.6d0: supR3HardenedDllNotificationCallback: load 740f0000 LB 0x00059000 C:\WINDOWS\system32\bcryptprimitives.dll [fFlags=0x0]
672370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
673370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=740f0000 'C:\WINDOWS\system32\bcryptprimitives.dll'
674370.6d0: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=00a98ab8)
675370.6d0: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=00a98ff8)
676370.6d0: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=00a992b0)
677370.6d0: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=00a99568)
678370.6d0: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=00a99820)
679370.6d0: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=00a99ad8)
680370.6d0: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=00a99d90)
681370.6d0: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=00a9a7d0)
682370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
683370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
684370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
685370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
686370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
687370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
688370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
689370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
690370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
691370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
692370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
693370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
694370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
695370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
696370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
697370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
698370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
699370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
700370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
701370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\System32\WINTRUST.DLL (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
702370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
703370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcrypt.dll'.
704370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\cryptsp.dll)
705370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\cryptsp.dll
706370.6d0: supR3HardenedDllNotificationCallback: load 73c40000 LB 0x00013000 C:\WINDOWS\SYSTEM32\CRYPTSP.dll [fFlags=0x0]
707370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\cryptsp.dll [lacks WinVerifyTrust]
708370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #16 'bcrypt.dll'.
709370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\rsaenh.dll)
710370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\rsaenh.dll
711370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'...
712370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008]
713370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
714370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcrypt.dll'...
715370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcrypt.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcrypt.dll' [rcNtRedir=0xc0150008]
716370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcrypt.dll [lacks WinVerifyTrust]
717370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\rsaenh.dll (rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
718370.6d0: supR3HardenedScreenImage/NtCreateSection: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
719370.6d0: supR3HardenedDllNotificationCallback: load 73910000 LB 0x0002f000 C:\WINDOWS\system32\rsaenh.dll [fFlags=0x0]
720370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\rsaenh.dll [lacks WinVerifyTrust]
721370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=73910000 'C:\WINDOWS\system32\rsaenh.dll'
722370.6d0: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #1 'bcryptprimitives.dll'.
723370.6d0: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Windows\System32\cryptbase.dll)
724370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\cryptbase.dll
725370.6d0: supR3HardenedDllNotificationCallback: load 73d70000 LB 0x0000a000 C:\WINDOWS\SYSTEM32\CRYPTBASE.dll [fFlags=0x0]
726370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\cryptbase.dll [lacks WinVerifyTrust]
727370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
728370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: Processing 'bcryptprimitives.dll'...
729370.6d0: supR3HardenedWinVerifyCacheProcessImportTodos: 'bcryptprimitives.dll' -> '\Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll' [rcNtRedir=0xc0150008]
730370.6d0: supR3HardenedScreenImage/Imports: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\bcryptprimitives.dll [lacks WinVerifyTrust]
731370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0x0 pwszSearchPath=00000001:<flags> [calling]
732370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=74f40000 'C:\WINDOWS\system32\kernel32.dll'
733370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\wintrust.dll [lacks WinVerifyTrust]
734370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=742f0000 'C:\Windows\System32\WINTRUST.DLL'
735370.6d0: supR3HardenedScreenImage/LdrLoadDll: cache hit (VINF_SUCCESS) on \Device\HarddiskVolume2\Windows\System32\crypt32.dll [lacks WinVerifyTrust]
736370.6d0: supR3HardenedMonitor_LdrLoadDll: pName=C:\WINDOWS\system32\CRYPT32.dll (rcNtResolve=0xc0150008) *pfFlags=0x2 pwszSearchPath=00000001:<flags> [calling]
737370.6d0: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=749a0000 'C:\WINDOWS\system32\CRYPT32.dll'
738370.6d0: supR3HardenedDllNotificationCallback: load 74fe0000 LB 0x00019000 C:\WINDOWS\system32\imagehlp.dll [fFlags=0x0]
739370.6d0: supHardenedWinVerifyImageByHandle: -> -626 (\Device\HarddiskVolume2\Windows\System32\imagehlp.dll)
740370.6d0: Error (rc=0):
741370.6d0: supR3HardenedScreenImage/LdrLoadDll: rc=Unknown Status -626 (0xfffffd8e) fImage=1 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume2\Windows\System32\imagehlp.dll:
742370.6d0: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\imagehlp.dll
743370.6d0: Fatal error:
744370.6d0: supR3HardenedDllNotificationCallback: supR3HardenedScreenImage failed on 'C:\WINDOWS\system32\imagehlp.dll' / '\??\C:\WINDOWS\system32\imagehlp.dll': 0xc0000190
7451f58.120c: supR3HardNtChildWaitFor[2]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 266 ms, the end);
7468a8.12d4: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0x1 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 1164 ms, the end);

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette