Advertisement
Guest User

Untitled

a guest
Dec 10th, 2016
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 35.23 KB | None | 0 0
  1. 17f4.1a68: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000014 g_uNtVerCombined=0x611db110
  2. 17f4.1a68: \SystemRoot\System32\ntdll.dll:
  3. 17f4.1a68: CreationTime: 2016-02-09T18:19:08.333415100Z
  4. 17f4.1a68: LastWriteTime: 2016-01-22T06:24:12.217581500Z
  5. 17f4.1a68: ChangeTime: 2016-02-18T02:26:32.163643000Z
  6. 17f4.1a68: FileAttributes: 0x20
  7. 17f4.1a68: Size: 0x1a73d8
  8. 17f4.1a68: NT Headers: 0xe0
  9. 17f4.1a68: Timestamp: 0x56a1c9c5
  10. 17f4.1a68: Machine: 0x8664 - amd64
  11. 17f4.1a68: Timestamp: 0x56a1c9c5
  12. 17f4.1a68: Image Version: 6.1
  13. 17f4.1a68: SizeOfImage: 0x1aa000 (1744896)
  14. 17f4.1a68: Resource Dir: 0x14e000 LB 0x5a028
  15. 17f4.1a68: ProductName: Microsoft® Windows® Operating System
  16. 17f4.1a68: ProductVersion: 6.1.7601.19135
  17. 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  18. 17f4.1a68: FileDescription: NT Layer DLL
  19. 17f4.1a68: \SystemRoot\System32\kernel32.dll:
  20. 17f4.1a68: CreationTime: 2016-02-09T18:19:06.698321500Z
  21. 17f4.1a68: LastWriteTime: 2016-01-22T06:15:31.619000000Z
  22. 17f4.1a68: ChangeTime: 2016-02-18T02:26:34.831247600Z
  23. 17f4.1a68: FileAttributes: 0x20
  24. 17f4.1a68: Size: 0x11c000
  25. 17f4.1a68: NT Headers: 0xe8
  26. 17f4.1a68: Timestamp: 0x56a1c9ab
  27. 17f4.1a68: Machine: 0x8664 - amd64
  28. 17f4.1a68: Timestamp: 0x56a1c9ab
  29. 17f4.1a68: Image Version: 6.1
  30. 17f4.1a68: SizeOfImage: 0x11f000 (1175552)
  31. 17f4.1a68: Resource Dir: 0x116000 LB 0x528
  32. 17f4.1a68: ProductName: Microsoft® Windows® Operating System
  33. 17f4.1a68: ProductVersion: 6.1.7601.19135
  34. 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  35. 17f4.1a68: FileDescription: Windows NT BASE API Client DLL
  36. 17f4.1a68: \SystemRoot\System32\KernelBase.dll:
  37. 17f4.1a68: CreationTime: 2016-02-09T18:19:07.986395200Z
  38. 17f4.1a68: LastWriteTime: 2016-01-22T06:15:31.822000000Z
  39. 17f4.1a68: ChangeTime: 2016-02-18T02:26:34.846847700Z
  40. 17f4.1a68: FileAttributes: 0x20
  41. 17f4.1a68: Size: 0x67200
  42. 17f4.1a68: NT Headers: 0xe8
  43. 17f4.1a68: Timestamp: 0x56a1c9ac
  44. 17f4.1a68: Machine: 0x8664 - amd64
  45. 17f4.1a68: Timestamp: 0x56a1c9ac
  46. 17f4.1a68: Image Version: 6.1
  47. 17f4.1a68: SizeOfImage: 0x6b000 (438272)
  48. 17f4.1a68: Resource Dir: 0x69000 LB 0x530
  49. 17f4.1a68: ProductName: Microsoft® Windows® Operating System
  50. 17f4.1a68: ProductVersion: 6.1.7601.19135
  51. 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  52. 17f4.1a68: FileDescription: Windows NT BASE API Client DLL
  53. 17f4.1a68: \SystemRoot\System32\apisetschema.dll:
  54. 17f4.1a68: CreationTime: 2016-02-09T18:19:05.510253600Z
  55. 17f4.1a68: LastWriteTime: 2016-01-22T06:12:25.181000000Z
  56. 17f4.1a68: ChangeTime: 2016-02-18T02:26:31.960842600Z
  57. 17f4.1a68: FileAttributes: 0x20
  58. 17f4.1a68: Size: 0x1a00
  59. 17f4.1a68: NT Headers: 0xc0
  60. 17f4.1a68: Timestamp: 0x56a1c890
  61. 17f4.1a68: Machine: 0x8664 - amd64
  62. 17f4.1a68: Timestamp: 0x56a1c890
  63. 17f4.1a68: Image Version: 6.1
  64. 17f4.1a68: SizeOfImage: 0x50000 (327680)
  65. 17f4.1a68: Resource Dir: 0x30000 LB 0x3f8
  66. 17f4.1a68: ProductName: Microsoft® Windows® Operating System
  67. 17f4.1a68: ProductVersion: 6.1.7601.19135
  68. 17f4.1a68: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  69. 17f4.1a68: FileDescription: ApiSet Schema DLL
  70. 17f4.1a68: supR3HardenedWinFindAdversaries: 0x80
  71. 17f4.1a68: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
  72. 17f4.1a68: CreationTime: 2016-02-05T20:31:00.715631500Z
  73. 17f4.1a68: LastWriteTime: 2016-03-26T06:09:55.730886200Z
  74. 17f4.1a68: ChangeTime: 2016-03-26T06:09:55.730886200Z
  75. 17f4.1a68: FileAttributes: 0x20
  76. 17f4.1a68: Size: 0x2eed8
  77. 17f4.1a68: NT Headers: 0xe0
  78. 17f4.1a68: Timestamp: 0x55b855d9
  79. 17f4.1a68: Machine: 0x8664 - amd64
  80. 17f4.1a68: Timestamp: 0x55b855d9
  81. 17f4.1a68: Image Version: 6.1
  82. 17f4.1a68: SizeOfImage: 0x33000 (208896)
  83. 17f4.1a68: Resource Dir: 0x31000 LB 0x3b8
  84. 17f4.1a68: ProductName: Malwarebytes Anti-Malware
  85. 17f4.1a68: ProductVersion: 0.3.0.0
  86. 17f4.1a68: FileVersion: 0.3.0.0
  87. 17f4.1a68: FileDescription: Malwarebytes Anti-Malware
  88. 17f4.1a68: \SystemRoot\System32\drivers\mwac.sys:
  89. 17f4.1a68: CreationTime: 2016-02-05T20:27:52.354857900Z
  90. 17f4.1a68: LastWriteTime: 2015-10-05T14:50:18.000000000Z
  91. 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.361858300Z
  92. 17f4.1a68: FileAttributes: 0x20
  93. 17f4.1a68: Size: 0xf8d8
  94. 17f4.1a68: NT Headers: 0xf8
  95. 17f4.1a68: Timestamp: 0x53a0f42a
  96. 17f4.1a68: Machine: 0x8664 - amd64
  97. 17f4.1a68: Timestamp: 0x53a0f42a
  98. 17f4.1a68: Image Version: 6.2
  99. 17f4.1a68: SizeOfImage: 0x12000 (73728)
  100. 17f4.1a68: Resource Dir: 0x10000 LB 0x3e0
  101. 17f4.1a68: ProductName: Malwarebytes Web Access Control
  102. 17f4.1a68: ProductVersion: 1.0.6.0
  103. 17f4.1a68: FileVersion: 1.0.6.0
  104. 17f4.1a68: FileDescription: Malwarebytes Web Access Control
  105. 17f4.1a68: \SystemRoot\System32\drivers\mbamchameleon.sys:
  106. 17f4.1a68: CreationTime: 2016-02-05T20:27:52.362858400Z
  107. 17f4.1a68: LastWriteTime: 2015-10-05T14:50:10.000000000Z
  108. 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.375859100Z
  109. 17f4.1a68: FileAttributes: 0x20
  110. 17f4.1a68: Size: 0x1aad8
  111. 17f4.1a68: NT Headers: 0xd8
  112. 17f4.1a68: Timestamp: 0x55c103c3
  113. 17f4.1a68: Machine: 0x8664 - amd64
  114. 17f4.1a68: Timestamp: 0x55c103c3
  115. 17f4.1a68: Image Version: 6.1
  116. 17f4.1a68: SizeOfImage: 0x1e000 (122880)
  117. 17f4.1a68: Resource Dir: 0x1c000 LB 0xba8
  118. 17f4.1a68: ProductName: Malwarebytes Chameleon
  119. 17f4.1a68: ProductVersion: 1.1.21.0
  120. 17f4.1a68: FileVersion: 1.1.21.0
  121. 17f4.1a68: FileDescription: Malwarebytes Chameleon Protection Driver
  122. 17f4.1a68: \SystemRoot\System32\drivers\mbam.sys:
  123. 17f4.1a68: CreationTime: 2016-02-05T20:27:52.350857700Z
  124. 17f4.1a68: LastWriteTime: 2015-10-05T14:50:06.000000000Z
  125. 17f4.1a68: ChangeTime: 2016-02-05T20:27:52.353857800Z
  126. 17f4.1a68: FileAttributes: 0x20
  127. 17f4.1a68: Size: 0x64d8
  128. 17f4.1a68: NT Headers: 0xd8
  129. 17f4.1a68: Timestamp: 0x55ca3257
  130. 17f4.1a68: Machine: 0x8664 - amd64
  131. 17f4.1a68: Timestamp: 0x55ca3257
  132. 17f4.1a68: Image Version: 6.1
  133. 17f4.1a68: SizeOfImage: 0xa000 (40960)
  134. 17f4.1a68: Resource Dir: 0x8000 LB 0x3a0
  135. 17f4.1a68: ProductName: Malwarebytes Anti-Malware
  136. 17f4.1a68: ProductVersion: 0.1.16.0
  137. 17f4.1a68: FileVersion: 0.1.16.0
  138. 17f4.1a68: FileDescription: Malwarebytes Anti-Malware
  139. 17f4.1a68: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
  140. 17f4.1a68: Calling main()
  141. 17f4.1a68: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x3
  142. 17f4.1a68: supR3HardenedWinInitAppBin(0x3): '\Device\HarddiskVolume5\VirtualBox'
  143. 17f4.1a68: System32: \Device\HarddiskVolume1\Windows\System32
  144. 17f4.1a68: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
  145. 17f4.1a68: KnownDllPath: C:\Windows\system32
  146. 17f4.1a68: '\Device\HarddiskVolume5\VirtualBox\VirtualBox.exe' has no imports
  147. 17f4.1a68: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume5\VirtualBox\VirtualBox.exe)
  148. 17f4.1a68: supR3HardNtEnableThreadCreation:
  149. 17f4.1a68: bcrypt.dll loaded at 000007fefcbe0000, BCryptOpenAlgorithmProvider at 000007fefcbe2640, preloading providers:
  150. 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD2',0,0) -> 0x0 (hAlgo=00000000003bbd10)
  151. 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD4',0,0) -> 0x0 (hAlgo=00000000003bc5a0)
  152. 17f4.1a68: BCryptOpenAlgorithmProvider(,'MD5',0,0) -> 0x0 (hAlgo=00000000003bc6c0)
  153. 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA1',0,0) -> 0x0 (hAlgo=00000000003bc8d0)
  154. 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA256',0,0) -> 0x0 (hAlgo=00000000003bc9f0)
  155. 17f4.1a68: BCryptOpenAlgorithmProvider(,'SHA512',0,0) -> 0x0 (hAlgo=00000000003bcb10)
  156. 17f4.1a68: BCryptOpenAlgorithmProvider(,'RSA',0,0) -> 0x0 (hAlgo=00000000003bcd50)
  157. 17f4.1a68: BCryptOpenAlgorithmProvider(,'DSA',0,0) -> 0x0 (hAlgo=00000000003bce70)
  158. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000000 pwszName=\SystemRoot\System32\ntdll.dll
  159. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e19d0
  160. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
  161. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=881FA305C5390C7D979151AFB211130389B9E066
  162. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\Windows\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_88_for_KB3126587~31bf3856ad364e35~amd64~~6.1.1.1.cat'; file='\SystemRoot\System32\ntdll.dll'
  163. 17f4.1a68: g_pfnWinVerifyTrust=000007fefd601010
  164. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=0000000000000328 pwszName=\Device\HarddiskVolume1\Windows\System32\crypt32.dll
  165. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 00000000003e19d0
  166. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
  167. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=BFD41401EDEBD4D914977D62B588ECABEE60CFD3
  168. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Retrying with fresh context (CryptCATAdminEnumCatalogFromHash -> 2388526074; iCat=0x0)
  169. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e19d0
  170. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
  171. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=BFD41401EDEBD4D914977D62B588ECABEE60CFD3
  172. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: CryptCATAdminEnumCatalogFromHash failed ERRROR_NOT_FOUND (2388526074)
  173. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: New context 00000000003e1a90
  174. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e1a90
  175. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=32 wszDigest=D45DD72483D0525D6D1FE373FEF48F6FEB014082305FF2753769E5B98AF38F2D
  176. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: CryptCATAdminEnumCatalogFromHash failed ERRROR_NOT_FOUND (1168)
  177. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile -> -22900 (org 22900)
  178. 17f4.1a68: supHardenedWinVerifyImageByHandle: -> -22900 (\Device\HarddiskVolume1\Windows\System32\crypt32.dll) WinVerifyTrust
  179. 17f4.1a68: Error (rc=0):
  180. 17f4.1a68: supR3HardenedScreenImage/preload: rc=Unknown Status -22900 (0xffffa68c) fImage=0 fProtect=0x0 fAccess=0x0 \Device\HarddiskVolume1\Windows\System32\crypt32.dll: Not signed.
  181. 17f4.1a68: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\crypt32.dll
  182. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hFile=000000000000033c pwszName=\Device\HarddiskVolume1\Windows\System32\wintrust.dll
  183. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: Cached context 00000000003e19d0
  184. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: hCatAdmin=00000000003e19d0
  185. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: cbHash=20 wszDigest=E1BBE4EB6D114F50142F24E2E2749EFD81021486
  186. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile: WinVerifyTrust => 0x0; cat='C:\Windows\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Package_75_for_KB3040272~31bf3856ad364e35~amd64~~6.1.1.1.cat'; file='\Device\HarddiskVolume1\Windows\System32\wintrust.dll'
  187. 17f4.1a68: supR3HardNtViCallWinVerifyTrustCatFile -> 0 (org 22900)
  188. 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #0 'msvcrt.dll'.
  189. 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #4 'crypt32.dll'.
  190. 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #6 'msasn1.dll'.
  191. 17f4.1a68: supR3HardenedWinVerifyCacheScheduleImports: Import todo: #7 'rpcrt4.dll'.
  192. 17f4.1a68: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Windows\System32\wintrust.dll) WinVerifyTrust
  193. 17f4.1a68: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\wintrust.dll
  194. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x5ad46780fa5df300 DC=com, DC=microsoft, CN=Microsoft Root Certificate Authority
  195. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xea5386456178582b C=ZA, ST=Western Cape, L=Durbanville, O=Thawte, OU=Thawte Certification, CN=Thawte Timestamping CA
  196. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x5bc62ead9aa03c81 C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.na2.lol.riotgames.com
  197. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3be670c1bd02a900 OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority
  198. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011
  199. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x646e3fe3ba08df00 C=US, O=MSFT, CN=Microsoft Authenticode(tm) Root Authority
  200. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x6b427e49376d2cdc C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.euw1.lol.riotgames.com
  201. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xe6568ecf67b3be92 C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=prod.eun1.lol.riotgames.com
  202. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xece4e4289e08b900 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010
  203. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x43a9cc371ff5385a O=Microsoft Trust Network, OU=Microsoft Corporation, OU=Microsoft Time Stamping Service Root, OU=Copyright (c) 1997 Microsoft Corp.
  204. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x2e2d2c7c68f0202e O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign Time Stamping Service Root, OU=NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.
  205. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd8dbfb2c27bfb200 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2008 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA - G3
  206. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x61a3a33f81aace00 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Object
  207. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf4fd306318ccda00 C=US, O=GeoTrust Inc., CN=GeoTrust Global CA
  208. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x83085097e9afdf00 O=Digital Signature Trust Co., CN=DST Root CA X3
  209. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x780679907625cc00 OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign
  210. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3d98ab22bb04a300 C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root
  211. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa0ee62086758b15d C=US, O=Equifax, OU=Equifax Secure Certificate Authority
  212. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd944bca189a00 C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2
  213. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x8ff6fc03c1edbd00 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., CN=Starfield Root Certificate Authority - G2
  214. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc6fa4243b695b600 C=US, O=Entrust, Inc., OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2006 Entrust, Inc., CN=Entrust Root Certification Authority
  215. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa3ce8d99e60eda00 C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
  216. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x560ad29254e89100 C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
  217. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa671e9fec832b700 C=US, O=Starfield Technologies, Inc., OU=Starfield Class 2 Certification Authority
  218. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xa8de7211e13be200 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA
  219. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7ae89c50f0b6a00f C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc., CN=GTE CyberTrust Global Root
  220. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd45980fbf0a0ac00 C=US, O=thawte, Inc., OU=Certification Services Division, OU=(c) 2006 thawte, Inc. - For authorized use only, CN=thawte Primary Root CA
  221. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x4d3835aa4180b200 C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2011
  222. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc9edb72b684ba00 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, OU=(c) 2009 Entrust, Inc. - for authorized use only, CN=Entrust Root Certification Authority - G2
  223. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf5cd95e581a4ab00 C=US, O=SecureTrust Corporation, CN=SecureTrust CA
  224. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x298be035a30bab00 C=DE, O=Deutsche Telekom AG, OU=T-TeleSec Trust Center, CN=Deutsche Telekom Root CA 2
  225. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xabd0695c5d11d15e C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
  226. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x6f2ebe0e24cfa600 OU=GlobalSign Root CA - R2, O=GlobalSign, CN=GlobalSign
  227. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x14018a1bf29e595c C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
  228. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x9e5bc2d78b6a3636 C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA, Email=premium-server@thawte.com
  229. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7c4fd32ec1b1ce00 C=PL, O=Unizeto Sp. z o.o., CN=Certum CA
  230. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xd4fbe673e5ccc600 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA
  231. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x16e64d2a56ccf200 C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., OU=http://certificates.starfieldtech.com/repository/, CN=Starfield Services Root Certificate Authority
  232. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x73e85f1bda5faa00 C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2
  233. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xb28612a94b4dad00 O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048)
  234. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x357a29080824af00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5
  235. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x59faf1086271bf00 C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., CN=Go Daddy Root Certificate Authority - G2
  236. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x466cbc09db88c100 C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
  237. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x3401b15e3761c700 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2008 VeriSign, Inc. - For authorized use only, CN=VeriSign Universal Root Certification Authority
  238. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x7cd4ff7b15b8be00 C=US, O=GeoTrust Inc., CN=GeoTrust Primary Certification Authority
  239. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x491857ead79dde00 C=US, O=The Go Daddy Group, Inc., OU=Go Daddy Class 2 Certification Authority
  240. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x1f78fc529cbacb00 C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G3
  241. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xc2ba72a37dfbe300 C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
  242. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x8043e4ce150ead00 C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA
  243. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0x331d58625ee2dc00 C=US, O=GeoTrust Inc., OU=(c) 2008 GeoTrust Inc. - For authorized use only, CN=GeoTrust Primary Certification Authority - G3
  244. 17f4.1a68: supR3HardenedWinIsDesiredRootCA: Adding 0xf2e6331af7b700 C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
  245. 17f4.1a68: supR3HardenedWinRetrieveTrustedRootCAs: cAdded=51
  246. 17f4.1a68: SUPR3HardenedMain: Load Runtime...
  247. 17f4.1a68: SUPR3HardenedMain: Load TrustedMain...
  248. 17f4.1a68: SUPR3HardenedMain: Calling TrustedMain (000007fedd481610)...
  249. 1f34.173c: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000020 g_uNtVerCombined=0x611db110
  250. 1f34.173c: \SystemRoot\System32\ntdll.dll:
  251. 1f34.173c: CreationTime: 2016-02-09T18:19:08.333415100Z
  252. 1f34.173c: LastWriteTime: 2016-01-22T06:24:12.217581500Z
  253. 1f34.173c: ChangeTime: 2016-02-18T02:26:32.163643000Z
  254. 1f34.173c: FileAttributes: 0x20
  255. 1f34.173c: Size: 0x1a73d8
  256. 1f34.173c: NT Headers: 0xe0
  257. 1f34.173c: Timestamp: 0x56a1c9c5
  258. 1f34.173c: Machine: 0x8664 - amd64
  259. 1f34.173c: Timestamp: 0x56a1c9c5
  260. 1f34.173c: Image Version: 6.1
  261. 1f34.173c: SizeOfImage: 0x1aa000 (1744896)
  262. 1f34.173c: Resource Dir: 0x14e000 LB 0x5a028
  263. 1f34.173c: ProductName: Microsoft® Windows® Operating System
  264. 1f34.173c: ProductVersion: 6.1.7601.19135
  265. 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  266. 1f34.173c: FileDescription: NT Layer DLL
  267. 1f34.173c: \SystemRoot\System32\kernel32.dll:
  268. 1f34.173c: CreationTime: 2016-02-09T18:19:06.698321500Z
  269. 1f34.173c: LastWriteTime: 2016-01-22T06:15:31.619000000Z
  270. 1f34.173c: ChangeTime: 2016-02-18T02:26:34.831247600Z
  271. 1f34.173c: FileAttributes: 0x20
  272. 1f34.173c: Size: 0x11c000
  273. 1f34.173c: NT Headers: 0xe8
  274. 1f34.173c: Timestamp: 0x56a1c9ab
  275. 1f34.173c: Machine: 0x8664 - amd64
  276. 1f34.173c: Timestamp: 0x56a1c9ab
  277. 1f34.173c: Image Version: 6.1
  278. 1f34.173c: SizeOfImage: 0x11f000 (1175552)
  279. 1f34.173c: Resource Dir: 0x116000 LB 0x528
  280. 1f34.173c: ProductName: Microsoft® Windows® Operating System
  281. 1f34.173c: ProductVersion: 6.1.7601.19135
  282. 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  283. 1f34.173c: FileDescription: Windows NT BASE API Client DLL
  284. 1f34.173c: \SystemRoot\System32\KernelBase.dll:
  285. 1f34.173c: CreationTime: 2016-02-09T18:19:07.986395200Z
  286. 1f34.173c: LastWriteTime: 2016-01-22T06:15:31.822000000Z
  287. 1f34.173c: ChangeTime: 2016-02-18T02:26:34.846847700Z
  288. 1f34.173c: FileAttributes: 0x20
  289. 1f34.173c: Size: 0x67200
  290. 1f34.173c: NT Headers: 0xe8
  291. 1f34.173c: Timestamp: 0x56a1c9ac
  292. 1f34.173c: Machine: 0x8664 - amd64
  293. 1f34.173c: Timestamp: 0x56a1c9ac
  294. 1f34.173c: Image Version: 6.1
  295. 1f34.173c: SizeOfImage: 0x6b000 (438272)
  296. 1f34.173c: Resource Dir: 0x69000 LB 0x530
  297. 1f34.173c: ProductName: Microsoft® Windows® Operating System
  298. 1f34.173c: ProductVersion: 6.1.7601.19135
  299. 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  300. 1f34.173c: FileDescription: Windows NT BASE API Client DLL
  301. 1f34.173c: \SystemRoot\System32\apisetschema.dll:
  302. 1f34.173c: CreationTime: 2016-02-09T18:19:05.510253600Z
  303. 1f34.173c: LastWriteTime: 2016-01-22T06:12:25.181000000Z
  304. 1f34.173c: ChangeTime: 2016-02-18T02:26:31.960842600Z
  305. 1f34.173c: FileAttributes: 0x20
  306. 1f34.173c: Size: 0x1a00
  307. 1f34.173c: NT Headers: 0xc0
  308. 1f34.173c: Timestamp: 0x56a1c890
  309. 1f34.173c: Machine: 0x8664 - amd64
  310. 1f34.173c: Timestamp: 0x56a1c890
  311. 1f34.173c: Image Version: 6.1
  312. 1f34.173c: SizeOfImage: 0x50000 (327680)
  313. 1f34.173c: Resource Dir: 0x30000 LB 0x3f8
  314. 1f34.173c: ProductName: Microsoft® Windows® Operating System
  315. 1f34.173c: ProductVersion: 6.1.7601.19135
  316. 1f34.173c: FileVersion: 6.1.7601.19135 (win7sp1_gdr.160121-1718)
  317. 1f34.173c: FileDescription: ApiSet Schema DLL
  318. 1f34.173c: supR3HardenedWinFindAdversaries: 0x80
  319. 1f34.173c: \SystemRoot\System32\drivers\MBAMSwissArmy.sys:
  320. 1f34.173c: CreationTime: 2016-02-05T20:31:00.715631500Z
  321. 1f34.173c: LastWriteTime: 2016-03-26T06:09:55.730886200Z
  322. 1f34.173c: ChangeTime: 2016-03-26T06:09:55.730886200Z
  323. 1f34.173c: FileAttributes: 0x20
  324. 1f34.173c: Size: 0x2eed8
  325. 1f34.173c: NT Headers: 0xe0
  326. 1f34.173c: Timestamp: 0x55b855d9
  327. 1f34.173c: Machine: 0x8664 - amd64
  328. 1f34.173c: Timestamp: 0x55b855d9
  329. 1f34.173c: Image Version: 6.1
  330. 1f34.173c: SizeOfImage: 0x33000 (208896)
  331. 1f34.173c: Resource Dir: 0x31000 LB 0x3b8
  332. 1f34.173c: ProductName: Malwarebytes Anti-Malware
  333. 1f34.173c: ProductVersion: 0.3.0.0
  334. 1f34.173c: FileVersion: 0.3.0.0
  335. 1f34.173c: FileDescription: Malwarebytes Anti-Malware
  336. 1f34.173c: \SystemRoot\System32\drivers\mwac.sys:
  337. 1f34.173c: CreationTime: 2016-02-05T20:27:52.354857900Z
  338. 1f34.173c: LastWriteTime: 2015-10-05T14:50:18.000000000Z
  339. 1f34.173c: ChangeTime: 2016-02-05T20:27:52.361858300Z
  340. 1f34.173c: FileAttributes: 0x20
  341. 1f34.173c: Size: 0xf8d8
  342. 1f34.173c: NT Headers: 0xf8
  343. 1f34.173c: Timestamp: 0x53a0f42a
  344. 1f34.173c: Machine: 0x8664 - amd64
  345. 1f34.173c: Timestamp: 0x53a0f42a
  346. 1f34.173c: Image Version: 6.2
  347. 1f34.173c: SizeOfImage: 0x12000 (73728)
  348. 1f34.173c: Resource Dir: 0x10000 LB 0x3e0
  349. 1f34.173c: ProductName: Malwarebytes Web Access Control
  350. 1f34.173c: ProductVersion: 1.0.6.0
  351. 1f34.173c: FileVersion: 1.0.6.0
  352. 1f34.173c: FileDescription: Malwarebytes Web Access Control
  353. 1f34.173c: \SystemRoot\System32\drivers\mbamchameleon.sys:
  354. 1f34.173c: CreationTime: 2016-02-05T20:27:52.362858400Z
  355. 1f34.173c: LastWriteTime: 2015-10-05T14:50:10.000000000Z
  356. 1f34.173c: ChangeTime: 2016-02-05T20:27:52.375859100Z
  357. 1f34.173c: FileAttributes: 0x20
  358. 1f34.173c: Size: 0x1aad8
  359. 1f34.173c: NT Headers: 0xd8
  360. 1f34.173c: Timestamp: 0x55c103c3
  361. 1f34.173c: Machine: 0x8664 - amd64
  362. 1f34.173c: Timestamp: 0x55c103c3
  363. 1f34.173c: Image Version: 6.1
  364. 1f34.173c: SizeOfImage: 0x1e000 (122880)
  365. 1f34.173c: Resource Dir: 0x1c000 LB 0xba8
  366. 1f34.173c: ProductName: Malwarebytes Chameleon
  367. 1f34.173c: ProductVersion: 1.1.21.0
  368. 1f34.173c: FileVersion: 1.1.21.0
  369. 1f34.173c: FileDescription: Malwarebytes Chameleon Protection Driver
  370. 1f34.173c: \SystemRoot\System32\drivers\mbam.sys:
  371. 1f34.173c: CreationTime: 2016-02-05T20:27:52.350857700Z
  372. 1f34.173c: LastWriteTime: 2015-10-05T14:50:06.000000000Z
  373. 1f34.173c: ChangeTime: 2016-02-05T20:27:52.353857800Z
  374. 1f34.173c: FileAttributes: 0x20
  375. 1f34.173c: Size: 0x64d8
  376. 1f34.173c: NT Headers: 0xd8
  377. 1f34.173c: Timestamp: 0x55ca3257
  378. 1f34.173c: Machine: 0x8664 - amd64
  379. 1f34.173c: Timestamp: 0x55ca3257
  380. 1f34.173c: Image Version: 6.1
  381. 1f34.173c: SizeOfImage: 0xa000 (40960)
  382. 1f34.173c: Resource Dir: 0x8000 LB 0x3a0
  383. 1f34.173c: ProductName: Malwarebytes Anti-Malware
  384. 1f34.173c: ProductVersion: 0.1.16.0
  385. 1f34.173c: FileVersion: 0.1.16.0
  386. 1f34.173c: FileDescription: Malwarebytes Anti-Malware
  387. 1f34.173c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
  388. 1f34.173c: Calling main()
  389. 1f34.173c: SUPR3HardenedMain: pszProgName=VBoxHeadless fFlags=0x0
  390. 1f34.173c: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
  391. 1f34.173c: SUPR3HardenedMain: Respawn #1
  392. 1f34.173c: System32: \Device\HarddiskVolume1\Windows\System32
  393. 1f34.173c: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
  394. 1f34.173c: KnownDllPath: C:\Windows\system32
  395. 1f34.173c: '\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe' has no imports
  396. 1f34.173c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe)
  397. 1f34.173c: supR3HardNtEnableThreadCreation:
  398. 1f34.173c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=000000007755b170 pvNtTerminateThread=000000007757d8e0
  399. 1f34.173c: supR3HardenedWinDoReSpawn(1): New child 1944.1f50 [kernel32].
  400. 1f34.173c: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd5000 cbPeb=0x380
  401. 1f34.173c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077530000 uNtDllChildAddr=0000000077530000
  402. 1f34.173c: supR3HardenedWinSetupChildInit: uLdrInitThunk=000000007755b170
  403. 1f34.173c: supR3HardenedWinSetupChildInit: Start child.
  404. 1f34.173c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
  405. 1f34.173c: supR3HardNtChildPurify: Startup delay kludge #1/0: 513 ms, 64 sleeps
  406. 1f34.173c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
  407. 1f34.173c: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
  408. 1f34.173c: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
  409. 1f34.173c: *0000000000030000-000000000002bfff 0x0002/0x0002 0x0040000
  410. 1f34.173c: 0000000000034000-0000000000027fff 0x0001/0x0000 0x0000000
  411. 1f34.173c: *0000000000040000-000000000003efff 0x0004/0x0004 0x0020000
  412. 1f34.173c: 0000000000041000-ffffffffffed1fff 0x0001/0x0000 0x0000000
  413. 1f34.173c: *00000000001b0000-00000000000b3fff 0x0000/0x0004 0x0020000
  414. 1f34.173c: 00000000002ac000-00000000002a9fff 0x0104/0x0004 0x0020000
  415. 1f34.173c: 00000000002ae000-00000000002abfff 0x0004/0x0004 0x0020000
  416. 1f34.173c: 00000000002b0000-ffffffff8902ffff 0x0001/0x0000 0x0000000
  417. 1f34.173c: *0000000077530000-0000000077530fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  418. 1f34.173c: 0000000077531000-000000007762ffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  419. 1f34.173c: 0000000077630000-000000007765efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  420. 1f34.173c: 000000007765f000-0000000077666fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  421. 1f34.173c: 0000000077667000-0000000077667fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  422. 1f34.173c: 0000000077668000-000000007766afff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  423. 1f34.173c: 000000007766b000-00000000776d9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
  424. 1f34.173c: 00000000776da000-000000006fdd3fff 0x0001/0x0000 0x0000000
  425. 1f34.173c: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
  426. 1f34.173c: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
  427. 1f34.173c: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
  428. 1f34.173c: 000000007fff0000-ffffffffc01fffff 0x0001/0x0000 0x0000000
  429. 1f34.173c: *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  430. 1f34.173c: 000000013fde1000-000000013fe4ffff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  431. 1f34.173c: 000000013fe50000-000000013fe50fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  432. 1f34.173c: 000000013fe51000-000000013fe95fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  433. 1f34.173c: 000000013fe96000-000000013fe96fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  434. 1f34.173c: 000000013fe97000-000000013fe97fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  435. 1f34.173c: 000000013fe98000-000000013fe9cfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  436. 1f34.173c: 000000013fe9d000-000000013fe9dfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  437. 1f34.173c: 000000013fe9e000-000000013fe9efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  438. 1f34.173c: 000000013fe9f000-000000013fea2fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  439. 1f34.173c: 000000013fea3000-000000013feeafff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe
  440. 1f34.173c: 000000013feeb000-fffff80380585fff 0x0001/0x0000 0x0000000
  441. 1f34.173c: *000007feff850000-000007feff850fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
  442. 1f34.173c: 000007feff851000-000007fdff0f1fff 0x0001/0x0000 0x0000000
  443. 1f34.173c: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
  444. 1f34.173c: 000007fffffd3000-000007fffffd0fff 0x0001/0x0000 0x0000000
  445. 1f34.173c: *000007fffffd5000-000007fffffd3fff 0x0004/0x0004 0x0020000
  446. 1f34.173c: 000007fffffd6000-000007fffffcdfff 0x0001/0x0000 0x0000000
  447. 1f34.173c: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
  448. 1f34.173c: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
  449. 1f34.173c: apisetschema.dll: timestamp 0x56a1c890 (rc=VINF_SUCCESS)
  450. 1f34.173c: VBoxHeadless.exe: timestamp 0x58332496 (rc=VINF_SUCCESS)
  451. 1f34.173c: '\Device\HarddiskVolume5\VirtualBox\VBoxHeadless.exe' has no imports
  452. 1f34.173c: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports
  453. 1f34.173c: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
  454. 1f34.173c: supR3HardNtChildPurify: Done after 559 ms and 0 fixes (loop #0).
  455. 1944.1f50: Log file opened: 5.1.10r112026 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100
  456. 1944.1f50: supR3HardenedVmProcessInit: uNtDllAddr=0000000077530000 g_uNtVerCombined=0x611db100
  457. 1944.1f50: ntdll.dll: timestamp 0x56a1c9c5 (rc=VINF_SUCCESS)
  458. 1944.1f50: New simple heap: #1 00000000002b0000 LB 0x400000 (for 1744896 allocation)
  459. 1f34.173c: supR3HardNtEnableThreadCreation:
  460. 1944.1f50: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume5\VirtualBox'
  461. 1944.1f50: System32: \Device\HarddiskVolume1\Windows\System32
  462. 1944.1f50: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
  463. 1944.1f50: KnownDllPath: C:\Windows\system32
  464. 1944.1f50: supR3HardenedVmProcessInit: Opening vboxdrv stub...
  465. 1944.1f50: Error opening VBoxDrvStub: STATUS_OBJECT_NAME_NOT_FOUND
  466. 1944.1f50: supR3HardenedWinReadErrorInfoDevice: NtCreateFile -> 0xc0000034
  467. 1944.1f50: Error -101 in supR3HardenedWinReSpawn! (enmWhat=3)
  468. 1944.1f50: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
  469.  
  470. Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
  471. 1f34.173c: supR3HardenedWinCheckChild: enmRequest=2 rc=-101 enmWhat=3 supR3HardenedWinReSpawn: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
  472.  
  473. Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
  474. 1f34.173c: Error -101 in supR3HardenedWinReSpawn! (enmWhat=3)
  475. 1f34.173c: NtCreateFile(\Device\VBoxDrvStub) failed: 0xc0000034 STATUS_OBJECT_NAME_NOT_FOUND (0 retries)
  476.  
  477. Driver is probably stuck stopping/starting. Try 'sc.exe query vboxdrv' to get more information about its state. Rebooting may actually help.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement