Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 17f4.1a68: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000014 g_uNtVerCombined=0x611db110
- 17f4.1a68: \SystemRoot\System32\ntdll.dll:
- 17f4.1a68: CreationTime: 2016-02-09T18:19:08.333415100Z
- 17f4.1a68: LastWriteTime: 2016-01-22T06:24:12.217581500Z
- 17f4.1a68: ChangeTime: 2016-02-18T02:26:32.163643000Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x1a73d8
- 17f4.1a68: NT Headers: 0xe0
- 17f4.1a68: Timestamp: 0x56a1c9c5
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x56a1c9c5
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x1aa000 (1744896)
- 17f4.1a68: Resource Dir: 0x14e000 LB 0x5a028
- 17f4.1a68: ProductName: Microsoft® Windows® Operating System
- 17f4.1a68: ProductVersion: 6.1.7601.19135
- 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 17f4.1a68: FileDescription: NT Layer DLL
- 17f4.1a68: \SystemRoot\System32\kernel32.dll:
- 17f4.1a68: CreationTime: 2016-02-09T18:19:06.698321500Z
- 17f4.1a68: LastWriteTime: 2016-01-22T06:15:31.619000000Z
- 17f4.1a68: ChangeTime: 2016-02-18T02:26:34.831247600Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x11c000
- 17f4.1a68: NT Headers: 0xe8
- 17f4.1a68: Timestamp: 0x56a1c9ab
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x56a1c9ab
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x11f000 (1175552)
- 17f4.1a68: Resource Dir: 0x116000 LB 0x528
- 17f4.1a68: ProductName: Microsoft® Windows® Operating System
- 17f4.1a68: ProductVersion: 6.1.7601.19135
- 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 17f4.1a68: FileDescription: Windows NT BASE API Client DLL
- 17f4.1a68: \SystemRoot\System32\KernelBase.dll:
- 17f4.1a68: CreationTime: 2016-02-09T18:19:07.986395200Z
- 17f4.1a68: LastWriteTime: 2016-01-22T06:15:31.822000000Z
- 17f4.1a68: ChangeTime: 2016-02-18T02:26:34.846847700Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x67200
- 17f4.1a68: NT Headers: 0xe8
- 17f4.1a68: Timestamp: 0x56a1c9ac
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x56a1c9ac
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x6b000 (438272)
- 17f4.1a68: Resource Dir: 0x69000 LB 0x530
- 17f4.1a68: ProductName: Microsoft® Windows® Operating System
- 17f4.1a68: ProductVersion: 6.1.7601.19135
- 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 17f4.1a68: FileDescription: Windows NT BASE API Client DLL
- 17f4.1a68: \SystemRoot\System32\apisetschema.dll:
- 17f4.1a68: CreationTime: 2016-02-09T18:19:05.510253600Z
- 17f4.1a68: LastWriteTime: 2016-01-22T06:12:25.181000000Z
- 17f4.1a68: ChangeTime: 2016-02-18T02:26:31.960842600Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x1a00
- 17f4.1a68: NT Headers: 0xc0
- 17f4.1a68: Timestamp: 0x56a1c890
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x56a1c890
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x50000 (327680)
- 17f4.1a68: Resource Dir: 0x30000 LB 0x3f8
- 17f4.1a68: ProductName: Microsoft® Windows® Operating System
- 17f4.1a68: ProductVersion: 6.1.7601.19135
- 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 17f4.1a68: FileDescription: ApiSet Schema DLL
- 17f4.1a68: supR3HardenedWinFindAdversaries: 0x80
- 17f4.1a68: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
- 17f4.1a68: CreationTime: 2016-02-05T20:31:00.715631500Z
- 17f4.1a68: LastWriteTime: 2016-03-26T06:09:55.730886200Z
- 17f4.1a68: ChangeTime: 2016-03-26T06:09:55.730886200Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x2eed8
- 17f4.1a68: NT Headers: 0xe0
- 17f4.1a68: Timestamp: 0x55b855d9
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x55b855d9
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x33000 (208896)
- 17f4.1a68: Resource Dir: 0x31000 LB 0x3b8
- 17f4.1a68: ProductName: Malwarebytes Anti-Malware
- 17f4.1a68: ProductVersion: 0.3.0.0
- 17f4.1a68: FileVersion: 0.3.0.0
- 17f4.1a68: FileDescription: Malwarebytes Anti-Malware
- 17f4.1a68: \SystemRoot\System32\drivers\mwac.sys:
- 17f4.1a68: CreationTime: 2016-02-05T20:27:52.354857900Z
- 17f4.1a68: LastWriteTime: 2015-10-05T14:50:18.000000000Z
- 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.361858300Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0xf8d8
- 17f4.1a68: NT Headers: 0xf8
- 17f4.1a68: Timestamp: 0x53a0f42a
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x53a0f42a
- 17f4.1a68: Image Version: 6.2
- 17f4.1a68: SizeOfImage: 0x12000 (73728)
- 17f4.1a68: Resource Dir: 0x10000 LB 0x3e0
- 17f4.1a68: ProductName: Malwarebytes Web Access Control
- 17f4.1a68: ProductVersion: 1.0.6.0
- 17f4.1a68: FileVersion: 1.0.6.0
- 17f4.1a68: FileDescription: Malwarebytes Web Access Control
- 17f4.1a68: \SystemRoot\System32\drivers\mbamchameleon.sys:
- 17f4.1a68: CreationTime: 2016-02-05T20:27:52.362858400Z
- 17f4.1a68: LastWriteTime: 2015-10-05T14:50:10.000000000Z
- 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.375859100Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x1aad8
- 17f4.1a68: NT Headers: 0xd8
- 17f4.1a68: Timestamp: 0x55c103c3
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x55c103c3
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0x1e000 (122880)
- 17f4.1a68: Resource Dir: 0x1c000 LB 0xba8
- 17f4.1a68: ProductName: Malwarebytes Chameleon
- 17f4.1a68: ProductVersion: 1.1.21.0
- 17f4.1a68: FileVersion: 1.1.21.0
- 17f4.1a68: FileDescription: Malwarebytes Chameleon Protection Driver
- 17f4.1a68: \SystemRoot\System32\drivers\mbam.sys:
- 17f4.1a68: CreationTime: 2016-02-05T20:27:52.350857700Z
- 17f4.1a68: LastWriteTime: 2015-10-05T14:50:06.000000000Z
- 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.353857800Z
- 17f4.1a68: FileAttributes: 0x20
- 17f4.1a68: Size: 0x64d8
- 17f4.1a68: NT Headers: 0xd8
- 17f4.1a68: Timestamp: 0x55ca3257
- 17f4.1a68: Machine: 0x8664 - amd64
- 17f4.1a68: Timestamp: 0x55ca3257
- 17f4.1a68: Image Version: 6.1
- 17f4.1a68: SizeOfImage: 0xa000 (40960)
- 17f4.1a68: Resource Dir: 0x8000 LB 0x3a0
- 17f4.1a68: ProductName: Malwarebytes Anti-Malware
- 17f4.1a68: ProductVersion: 0.1.16.0
- 17f4.1a68: FileVersion: 0.1.16.0
- 17f4.1a68: FileDescription: Malwarebytes Anti-Malware
- 17f4.1a68: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
- 17f4.1a68: Calling main()
- 17f4.1a68: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x3
- 17f4.1a68: supR3HardenedWinInitAppBin(0x3): '\Device\HarddiskVolume5\VirtualBox'
- 17f4.1a68: System32: \Device\HarddiskVolume1\Windows\System32
- 17f4.1a68: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
- 17f4.1a68: KnownDllPath: C:\Windows\system32
- 17f4.1a68: '\Device\HarddiskVolume5\VirtualBox\VirtualBox.exe' has no imports
- 17f4.1a68: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume5\VirtualBox\VirtualBox.exe)
- 17f4.1a68: supR3HardNtEnableThreadCreation:
- 17f4.1a68: bcrypt.dll loaded at 000007fefcbe0000, BCryptOpenAlgorithmProvider at 000007fefcbe2640, preloading providers:
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=00000000003bbd10)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=00000000003bc5a0)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=00000000003bc6c0)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=00000000003bc8d0)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=00000000003bc9f0)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=00000000003bcb10)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=00000000003bcd50)
- 17f4.1a68: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=00000000003bce70)
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000000 pwszName=\SystemRoot\System32\ntdll.dll
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=881FA305C5390C7D979151AFB211130389B9E066
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\Windows\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_88_for_KB3126587~31bf3856ad364e35~amd64~~6.1.1.1.cat'; file='\SystemRoot\System32\ntdll.dll'
- 17f4.1a68: g_pfnWinVerifyTrust=000007fefd601010
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000328 pwszName=\Device\HarddiskVolume1\Windows\System32\crypt32.dll
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=BFD41401EDEBD4D914977D62B588ECABEE60CFD3
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Retrying with fresh context (CryptCATAdminEnumCatalogFromHash -> 2388526074; iCat=0x0)
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=BFD41401EDEBD4D914977D62B588ECABEE60CFD3
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: CryptCATAdminEnumCatalogFromHash failed ERRROR_NOT_FOUND (2388526074)
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e1a90
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e1a90
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=32 wszDigest=D45DD72483D0525D6D1FE373FEF48F6FEB014082305FF2753769E5B98AF38F2D
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: CryptCATAdminEnumCatalogFromHash failed ERRROR_NOT_FOUND (1168)
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile -> -22900 (org 22900)
- 17f4.1a68: supHardenedWinVerifyImageByHandle: -> -22900 (\Device\HarddiskVolume1\Windows\System32\crypt32.dll) WinVerifyTrust
- 17f4.1a68: Error (rc=0):
- 17f4.1a68: supR3HardenedScreenImage/preload: rc=Unknown Status -22900 (0xffffa68c) fImage=0 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume1\Windows\System32\crypt32.dll: Not signed.
- 17f4.1a68: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\crypt32.dll
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=000000000000033c pwszName=\Device\HarddiskVolume1\Windows\System32\wintrust.dll
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=E1BBE4EB6D114F50142F24E2E2749EFD81021486
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\Windows\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_75_for_KB3040272~31bf3856ad364e35~amd64~~6.1.1.1.cat'; file='\Device\HarddiskVolume1\Windows\System32\wintrust.dll'
- 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900)
- 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
- 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #4 'crypt32.dll'.
- 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'msasn1.dll'.
- 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #7 'rpcrt4.dll'.
- 17f4.1a68: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Windows\System32\wintrust.dll) WinVerifyTrust
- 17f4.1a68: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\wintrust.dll
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x5ad46780fa5df300 DC=com, DC=microsoft, CN=Microsoft Root Certificate Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xea5386456178582b C=ZA, ST=Western Cape, L=Durbanville, O=Thawte, OU=Thawte Certification, CN=Thawte Timestamping CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x5bc62ead9aa03c81 C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.na2.lol.riotgames.com
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3be670c1bd02a900 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x646e3fe3ba08df00 C=US, O=MSFT, CN=Microsoft Authenticode(tm) Root Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x6b427e49376d2cdc C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.euw1.lol.riotgames.com
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xe6568ecf67b3be92 C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.eun1.lol.riotgames.com
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xece4e4289e08b900 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x43a9cc371ff5385a O=Microsoft Trust Network, OU=Microsoft Corporation, OU=Microsoft Time Stamping Service Root, OU=Copyright (c) 1997 Microsoft Corp.
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x2e2d2c7c68f0202e O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign Time Stamping Service Root, OU=NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd8dbfb2c27bfb200 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2008 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA - G3
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x61a3a33f81aace00 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Object
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf4fd306318ccda00 C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x83085097e9afdf00 O=Digital Signature Trust Co., CN=DST Root CA X3
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x780679907625cc00 OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa0ee62086758b15d C=US, O=Equifax, OU=Equifax Secure Certificate Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd944bca189a00 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x8ff6fc03c1edbd00 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc6fa4243b695b600 C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa3ce8d99e60eda00 C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x560ad29254e89100 C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa671e9fec832b700 C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa8de7211e13be200 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7ae89c50f0b6a00f C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd45980fbf0a0ac00 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc9edb72b684ba00 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf5cd95e581a4ab00 C=US, O=SecureTrust Corporation, CN=SecureTrust CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x298be035a30bab00 C=DE, O=Deutsche Telekom AG, OU=T-TeleSec Trust Center, CN=Deutsche Telekom Root CA 2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xabd0695c5d11d15e C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x6f2ebe0e24cfa600 OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x14018a1bf29e595c C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x9e5bc2d78b6a3636 C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA, Email=premium-server@thawte.com
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7c4fd32ec1b1ce00 C=PL, O=Unizeto Sp. z o.o., CN=Certum CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x16e64d2a56ccf200 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., OU=http://certificates.starfieldtech.com/repository/, CN=Starfield Services Root Certificate Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x73e85f1bda5faa00 C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xb28612a94b4dad00 O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048)
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x357a29080824af00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x59faf1086271bf00 C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x466cbc09db88c100 C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3401b15e3761c700 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2008 VeriSign, Inc. - For authorized use only, CN=VeriSign Universal Root Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7cd4ff7b15b8be00 C=US, O=GeoTrust Inc., CN=GeoTrust Primary Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x491857ead79dde00 C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x1f78fc529cbacb00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G3
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc2ba72a37dfbe300 C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x8043e4ce150ead00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x331d58625ee2dc00 C=US, O=GeoTrust Inc., OU=(c) 2008 GeoTrust Inc. - For authorized use only, CN=GeoTrust Primary Certification Authority - G3
- 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf2e6331af7b700 C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
- 17f4.1a68: supR3HardenedWinRetrieveTrustedRootCAs: cAdded=51
- 17f4.1a68: SUPR3HardenedMain: Load Runtime...
- 17f4.1a68: SUPR3HardenedMain: Load TrustedMain...
- 17f4.1a68: SUPR3HardenedMain: Calling TrustedMain (000007fedd481610)...
- 1f34.173c: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000020 g_uNtVerCombined=0x611db110
- 1f34.173c: \SystemRoot\System32\ntdll.dll:
- 1f34.173c: CreationTime: 2016-02-09T18:19:08.333415100Z
- 1f34.173c: LastWriteTime: 2016-01-22T06:24:12.217581500Z
- 1f34.173c: ChangeTime: 2016-02-18T02:26:32.163643000Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x1a73d8
- 1f34.173c: NT Headers: 0xe0
- 1f34.173c: Timestamp: 0x56a1c9c5
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x56a1c9c5
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x1aa000 (1744896)
- 1f34.173c: Resource Dir: 0x14e000 LB 0x5a028
- 1f34.173c: ProductName: Microsoft® Windows® Operating System
- 1f34.173c: ProductVersion: 6.1.7601.19135
- 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 1f34.173c: FileDescription: NT Layer DLL
- 1f34.173c: \SystemRoot\System32\kernel32.dll:
- 1f34.173c: CreationTime: 2016-02-09T18:19:06.698321500Z
- 1f34.173c: LastWriteTime: 2016-01-22T06:15:31.619000000Z
- 1f34.173c: ChangeTime: 2016-02-18T02:26:34.831247600Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x11c000
- 1f34.173c: NT Headers: 0xe8
- 1f34.173c: Timestamp: 0x56a1c9ab
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x56a1c9ab
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x11f000 (1175552)
- 1f34.173c: Resource Dir: 0x116000 LB 0x528
- 1f34.173c: ProductName: Microsoft® Windows® Operating System
- 1f34.173c: ProductVersion: 6.1.7601.19135
- 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 1f34.173c: FileDescription: Windows NT BASE API Client DLL
- 1f34.173c: \SystemRoot\System32\KernelBase.dll:
- 1f34.173c: CreationTime: 2016-02-09T18:19:07.986395200Z
- 1f34.173c: LastWriteTime: 2016-01-22T06:15:31.822000000Z
- 1f34.173c: ChangeTime: 2016-02-18T02:26:34.846847700Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x67200
- 1f34.173c: NT Headers: 0xe8
- 1f34.173c: Timestamp: 0x56a1c9ac
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x56a1c9ac
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x6b000 (438272)
- 1f34.173c: Resource Dir: 0x69000 LB 0x530
- 1f34.173c: ProductName: Microsoft® Windows® Operating System
- 1f34.173c: ProductVersion: 6.1.7601.19135
- 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 1f34.173c: FileDescription: Windows NT BASE API Client DLL
- 1f34.173c: \SystemRoot\System32\apisetschema.dll:
- 1f34.173c: CreationTime: 2016-02-09T18:19:05.510253600Z
- 1f34.173c: LastWriteTime: 2016-01-22T06:12:25.181000000Z
- 1f34.173c: ChangeTime: 2016-02-18T02:26:31.960842600Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x1a00
- 1f34.173c: NT Headers: 0xc0
- 1f34.173c: Timestamp: 0x56a1c890
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x56a1c890
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x50000 (327680)
- 1f34.173c: Resource Dir: 0x30000 LB 0x3f8
- 1f34.173c: ProductName: Microsoft® Windows® Operating System
- 1f34.173c: ProductVersion: 6.1.7601.19135
- 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
- 1f34.173c: FileDescription: ApiSet Schema DLL
- 1f34.173c: supR3HardenedWinFindAdversaries: 0x80
- 1f34.173c: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
- 1f34.173c: CreationTime: 2016-02-05T20:31:00.715631500Z
- 1f34.173c: LastWriteTime: 2016-03-26T06:09:55.730886200Z
- 1f34.173c: ChangeTime: 2016-03-26T06:09:55.730886200Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x2eed8
- 1f34.173c: NT Headers: 0xe0
- 1f34.173c: Timestamp: 0x55b855d9
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x55b855d9
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x33000 (208896)
- 1f34.173c: Resource Dir: 0x31000 LB 0x3b8
- 1f34.173c: ProductName: Malwarebytes Anti-Malware
- 1f34.173c: ProductVersion: 0.3.0.0
- 1f34.173c: FileVersion: 0.3.0.0
- 1f34.173c: FileDescription: Malwarebytes Anti-Malware
- 1f34.173c: \SystemRoot\System32\drivers\mwac.sys:
- 1f34.173c: CreationTime: 2016-02-05T20:27:52.354857900Z
- 1f34.173c: LastWriteTime: 2015-10-05T14:50:18.000000000Z
- 1f34.173c: ChangeTime: 2016-02-05T20:27:52.361858300Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0xf8d8
- 1f34.173c: NT Headers: 0xf8
- 1f34.173c: Timestamp: 0x53a0f42a
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x53a0f42a
- 1f34.173c: Image Version: 6.2
- 1f34.173c: SizeOfImage: 0x12000 (73728)
- 1f34.173c: Resource Dir: 0x10000 LB 0x3e0
- 1f34.173c: ProductName: Malwarebytes Web Access Control
- 1f34.173c: ProductVersion: 1.0.6.0
- 1f34.173c: FileVersion: 1.0.6.0
- 1f34.173c: FileDescription: Malwarebytes Web Access Control
- 1f34.173c: \SystemRoot\System32\drivers\mbamchameleon.sys:
- 1f34.173c: CreationTime: 2016-02-05T20:27:52.362858400Z
- 1f34.173c: LastWriteTime: 2015-10-05T14:50:10.000000000Z
- 1f34.173c: ChangeTime: 2016-02-05T20:27:52.375859100Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x1aad8
- 1f34.173c: NT Headers: 0xd8
- 1f34.173c: Timestamp: 0x55c103c3
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x55c103c3
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0x1e000 (122880)
- 1f34.173c: Resource Dir: 0x1c000 LB 0xba8
- 1f34.173c: ProductName: Malwarebytes Chameleon
- 1f34.173c: ProductVersion: 1.1.21.0
- 1f34.173c: FileVersion: 1.1.21.0
- 1f34.173c: FileDescription: Malwarebytes Chameleon Protection Driver
- 1f34.173c: \SystemRoot\System32\drivers\mbam.sys:
- 1f34.173c: CreationTime: 2016-02-05T20:27:52.350857700Z
- 1f34.173c: LastWriteTime: 2015-10-05T14:50:06.000000000Z
- 1f34.173c: ChangeTime: 2016-02-05T20:27:52.353857800Z
- 1f34.173c: FileAttributes: 0x20
- 1f34.173c: Size: 0x64d8
- 1f34.173c: NT Headers: 0xd8
- 1f34.173c: Timestamp: 0x55ca3257
- 1f34.173c: Machine: 0x8664 - amd64
- 1f34.173c: Timestamp: 0x55ca3257
- 1f34.173c: Image Version: 6.1
- 1f34.173c: SizeOfImage: 0xa000 (40960)
- 1f34.173c: Resource Dir: 0x8000 LB 0x3a0
- 1f34.173c: ProductName: Malwarebytes Anti-Malware
- 1f34.173c: ProductVersion: 0.1.16.0
- 1f34.173c: FileVersion: 0.1.16.0
- 1f34.173c: FileDescription: Malwarebytes Anti-Malware
- 1f34.173c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
- 1f34.173c: Calling main()
- 1f34.173c: SUPR3HardenedMain: pszProgName=VBoxHeadless fFlags=0x0
- 1f34.173c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
- 1f34.173c: SUPR3HardenedMain: Respawn #1
- 1f34.173c: System32: \Device\HarddiskVolume1\Windows\System32
- 1f34.173c: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
- 1f34.173c: KnownDllPath: C:\Windows\system32
- 1f34.173c: '\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe' has no imports
- 1f34.173c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe)
- 1f34.173c: supR3HardNtEnableThreadCreation:
- 1f34.173c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=000000007755b170 pvNtTerminateThread=000000007757d8e0
- 1f34.173c: supR3HardenedWinDoReSpawn(1): New child 1944.1f50 [kernel32].
- 1f34.173c: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd5000 cbPeb=0x380
- 1f34.173c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077530000 uNtDllChildAddr=0000000077530000
- 1f34.173c: supR3HardenedWinSetupChildInit: uLdrInitThunk=000000007755b170
- 1f34.173c: supR3HardenedWinSetupChildInit: Start child.
- 1f34.173c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
- 1f34.173c: supR3HardNtChildPurify: Startup delay kludge #1/0: 513 ms, 64 sleeps
- 1f34.173c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
- 1f34.173c: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
- 1f34.173c: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
- 1f34.173c: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000
- 1f34.173c: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000
- 1f34.173c: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000
- 1f34.173c: 0000000000041000-ffffffffffed1fff 0x0001/0x0000 0x0000000
- 1f34.173c: *00000000001b0000-00000000000b3fff 0x0000/0x0004 0x0020000
- 1f34.173c: 00000000002ac000-00000000002a9fff 0x0104/0x0004 0x0020000
- 1f34.173c: 00000000002ae000-00000000002abfff 0x0004/0x0004 0x0020000
- 1f34.173c: 00000000002b0000-ffffffff8902ffff 0x0001/0x0000 0x0000000
- 1f34.173c: *0000000077530000-0000000077530fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 0000000077531000-000000007762ffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 0000000077630000-000000007765efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 000000007765f000-0000000077666fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 0000000077667000-0000000077667fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 0000000077668000-000000007766afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 000000007766b000-00000000776d9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
- 1f34.173c: 00000000776da000-000000006fdd3fff 0x0001/0x0000 0x0000000
- 1f34.173c: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
- 1f34.173c: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
- 1f34.173c: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
- 1f34.173c: 000000007fff0000-ffffffffc01fffff 0x0001/0x0000 0x0000000
- 1f34.173c: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fde1000-000000013fe4ffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe50000-000000013fe50fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe51000-000000013fe95fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe96000-000000013fe96fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe97000-000000013fe97fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe98000-000000013fe9cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe9d000-000000013fe9dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe9e000-000000013fe9efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fe9f000-000000013fea2fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013fea3000-000000013feeafff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
- 1f34.173c: 000000013feeb000-fffff80380585fff 0x0001/0x0000 0x0000000
- 1f34.173c: *000007feff850000-000007feff850fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
- 1f34.173c: 000007feff851000-000007fdff0f1fff 0x0001/0x0000 0x0000000
- 1f34.173c: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
- 1f34.173c: 000007fffffd3000-000007fffffd0fff 0x0001/0x0000 0x0000000
- 1f34.173c: *000007fffffd5000-000007fffffd3fff 0x0004/0x0004 0x0020000
- 1f34.173c: 000007fffffd6000-000007fffffcdfff 0x0001/0x0000 0x0000000
- 1f34.173c: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
- 1f34.173c: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
- 1f34.173c: apisetschema.dll: timestamp 0x56a1c890 (rc=VINF_SUCCESS)
- 1f34.173c: VBoxHeadless.exe: timestamp 0x58332496 (rc=VINF_SUCCESS)
- 1f34.173c: '\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe' has no imports
- 1f34.173c: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports
- 1f34.173c: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
- 1f34.173c: supR3HardNtChildPurify: Done after 559 ms and 0 fixes (loop #0).
- 1944.1f50: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100
- 1944.1f50: supR3HardenedVmProcessInit: uNtDllAddr=0000000077530000 g_uNtVerCombined=0x611db100
- 1944.1f50: ntdll.dll: timestamp 0x56a1c9c5 (rc=VINF_SUCCESS)
- 1944.1f50: New simple heap: #1 00000000002b0000 LB 0x400000 (for 1744896 allocation)
- 1f34.173c: supR3HardNtEnableThreadCreation:
- 1944.1f50: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
- 1944.1f50: System32: \Device\HarddiskVolume1\Windows\System32
- 1944.1f50: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
- 1944.1f50: KnownDllPath: C:\Windows\system32
- 1944.1f50: supR3HardenedVmProcessInit: Opening vboxdrv stub...
- 1944.1f50: Error opening VBoxDrvStub: STATUS_OBJECT_NAME_NOT_FOUND
- 1944.1f50: supR3HardenedWinReadErrorInfoDevice: NtCreateFile -> 0xc0000034
- 1944.1f50: Error -101 in supR3HardenedWinReSpawn! (enmWhat=3)
- 1944.1f50: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
- Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
- 1f34.173c: supR3HardenedWinCheckChild: enmRequest=2 rc=-101 enmWhat=3 supR3HardenedWinReSpawn: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
- Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
- 1f34.173c: Error -101 in supR3HardenedWinReSpawn! (enmWhat=3)
- 1f34.173c: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
- Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement