VirtualBox

Changes between Initial Version and Version 1 of Ticket #13659, comment 13


Ignore:
Timestamp:
07/04/2017 09:00:22 AM (4 years ago)
Author:
frank
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #13659, comment 13

    initial v1  
    1 I get this with the latest 5.1.22 version 
     1I get this with the latest 5.1.22 version. 
    22 
    3 Attached is the error log generated 
    4  
    5 658.2624: Log file opened: 5.1.22r115126 g_hStartupLog=000000000000024c g_uNtVerCombined=0x611db110 
    6 658.2624: \SystemRoot\System32\ntdll.dll: 
    7 658.2624:     CreationTime:    2017-05-15T11:40:24.977655900Z 
    8 658.2624:     LastWriteTime:   2017-04-28T01:11:49.878278200Z 
    9 658.2624:     ChangeTime:      2017-05-15T11:48:18.514070200Z 
    10 658.2624:     FileAttributes:  0x20 
    11 658.2624:     Size:            0x1a7100 
    12 658.2624:     NT Headers:      0xe0 
    13 658.2624:     Timestamp:       0x590296ce 
    14 658.2624:     Machine:         0x8664 - amd64 
    15 658.2624:     Timestamp:       0x590296ce 
    16 658.2624:     Image Version:   6.1 
    17 658.2624:     SizeOfImage:     0x1aa000 (1744896) 
    18 658.2624:     Resource Dir:    0x14e000 LB 0x5a028 
    19 658.2624:     [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    20 658.2624:     [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 
    21 658.2624:     ProductName:     Microsoft® Windows® Operating System 
    22 658.2624:     ProductVersion:  6.1.7601.23796 
    23 658.2624:     FileVersion:     6.1.7601.23796 (win7sp1_ldr.170427-1518) 
    24 658.2624:     FileDescription: NT Layer DLL 
    25 658.2624: \SystemRoot\System32\kernel32.dll: 
    26 658.2624:     CreationTime:    2017-05-15T11:40:25.367655900Z 
    27 658.2624:     LastWriteTime:   2017-04-28T01:10:02.307000000Z 
    28 658.2624:     ChangeTime:      2017-05-15T11:48:23.818079600Z 
    29 658.2624:     FileAttributes:  0x20 
    30 658.2624:     Size:            0x11c000 
    31 658.2624:     NT Headers:      0xe0 
    32 658.2624:     Timestamp:       0x59029713 
    33 658.2624:     Machine:         0x8664 - amd64 
    34 658.2624:     Timestamp:       0x59029713 
    35 658.2624:     Image Version:   6.1 
    36 658.2624:     SizeOfImage:     0x11f000 (1175552) 
    37 658.2624:     Resource Dir:    0x116000 LB 0x528 
    38 658.2624:     [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    39 658.2624:     [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 
    40 658.2624:     ProductName:     Microsoft® Windows® Operating System 
    41 658.2624:     ProductVersion:  6.1.7601.23796 
    42 658.2624:     FileVersion:     6.1.7601.23796 (win7sp1_ldr.170427-1518) 
    43 658.2624:     FileDescription: Windows NT BASE API Client DLL 
    44 658.2624: \SystemRoot\System32\KernelBase.dll: 
    45 658.2624:     CreationTime:    2017-05-15T11:40:27.080155900Z 
    46 658.2624:     LastWriteTime:   2017-04-28T01:10:02.307000000Z 
    47 658.2624:     ChangeTime:      2017-05-15T11:48:23.849279600Z 
    48 658.2624:     FileAttributes:  0x20 
    49 658.2624:     Size:            0x66800 
    50 658.2624:     NT Headers:      0xe8 
    51 658.2624:     Timestamp:       0x59029714 
    52 658.2624:     Machine:         0x8664 - amd64 
    53 658.2624:     Timestamp:       0x59029714 
    54 658.2624:     Image Version:   6.1 
    55 658.2624:     SizeOfImage:     0x6a000 (434176) 
    56 658.2624:     Resource Dir:    0x68000 LB 0x530 
    57 658.2624:     [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    58 658.2624:     [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)] 
    59 658.2624:     ProductName:     Microsoft® Windows® Operating System 
    60 658.2624:     ProductVersion:  6.1.7601.23796 
    61 658.2624:     FileVersion:     6.1.7601.23796 (win7sp1_ldr.170427-1518) 
    62 658.2624:     FileDescription: Windows NT BASE API Client DLL 
    63 658.2624: \SystemRoot\System32\apisetschema.dll: 
    64 658.2624:     CreationTime:    2017-05-15T11:40:28.850155900Z 
    65 658.2624:     LastWriteTime:   2017-04-28T01:09:58.126000000Z 
    66 658.2624:     ChangeTime:      2017-05-15T11:48:18.233269700Z 
    67 658.2624:     FileAttributes:  0x20 
    68 658.2624:     Size:            0x1a00 
    69 658.2624:     NT Headers:      0xc0 
    70 658.2624:     Timestamp:       0x590296af 
    71 658.2624:     Machine:         0x8664 - amd64 
    72 658.2624:     Timestamp:       0x590296af 
    73 658.2624:     Image Version:   6.1 
    74 658.2624:     SizeOfImage:     0x50000 (327680) 
    75 658.2624:     Resource Dir:    0x30000 LB 0x3f8 
    76 658.2624:     [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    77 658.2624:     [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)] 
    78 658.2624:     ProductName:     Microsoft® Windows® Operating System 
    79 658.2624:     ProductVersion:  6.1.7601.23796 
    80 658.2624:     FileVersion:     6.1.7601.23796 (win7sp1_ldr.170427-1518) 
    81 658.2624:     FileDescription: ApiSet Schema DLL 
    82 658.2624: Found driver SysPlant (0x1) 
    83 658.2624: Found driver SymNetS (0x2) 
    84 658.2624: Found driver SRTSPX (0x2) 
    85 658.2624: Found driver SymEvent (0x2) 
    86 658.2624: Found driver SymIRON (0x2) 
    87 658.2624: supR3HardenedWinFindAdversaries: 0x3 
    88 658.2624: \SystemRoot\System32\drivers\SysPlant.sys: 
    89 658.2624:     CreationTime:    2015-04-08T09:25:06.205658700Z 
    90 658.2624:     LastWriteTime:   2015-04-08T09:25:06.205658700Z 
    91 658.2624:     ChangeTime:      2015-04-08T09:25:06.205658700Z 
    92 658.2624:     FileAttributes:  0x20 
    93 658.2624:     Size:            0x26f40 
    94 658.2624:     NT Headers:      0x100 
    95 658.2624:     Timestamp:       0x5413cb4e 
    96 658.2624:     Machine:         0x8664 - amd64 
    97 658.2624:     Timestamp:       0x5413cb4e 
    98 658.2624:     Image Version:   5.0 
    99 658.2624:     SizeOfImage:     0x2d000 (184320) 
    100 658.2624:     Resource Dir:    0x2b000 LB 0x498 
    101 658.2624:     [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    102 658.2624:     [Raw version resource data: 0x2b0b8 LB 0x3e0, codepage 0x4e4 (reserved 0x0)] 
    103 658.2624:     ProductName:     Symantec CMC Firewall 
    104 658.2624:     ProductVersion:  12.1.5337.5000 
    105 658.2624:     FileVersion:     12.1.5337.5000 
    106 658.2624:     FileDescription: Symantec CMC Firewall SysPlant 
    107 658.2624: \SystemRoot\System32\sysfer.dll: 
    108 658.2624:     CreationTime:    2015-04-08T09:25:06.200658700Z 
    109 658.2624:     LastWriteTime:   2015-04-08T09:25:06.200658700Z 
    110 658.2624:     ChangeTime:      2015-04-08T09:25:06.200658700Z 
    111 658.2624:     FileAttributes:  0x20 
    112 658.2624:     Size:            0x70f60 
    113 658.2624:     NT Headers:      0xe8 
    114 658.2624:     Timestamp:       0x5413cb55 
    115 658.2624:     Machine:         0x8664 - amd64 
    116 658.2624:     Timestamp:       0x5413cb55 
    117 658.2624:     Image Version:   0.0 
    118 658.2624:     SizeOfImage:     0x88000 (557056) 
    119 658.2624:     Resource Dir:    0x86000 LB 0x630 
    120 658.2624:     [Version info resource found at 0xc8! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    121 658.2624:     [Raw version resource data: 0x86100 LB 0x3d4, codepage 0x4e4 (reserved 0x0)] 
    122 658.2624:     ProductName:     Symantec CMC Firewall 
    123 658.2624:     ProductVersion:  12.1.5337.5000 
    124 658.2624:     FileVersion:     12.1.5337.5000 
    125 658.2624:     FileDescription: Symantec CMC Firewall sysfer 
    126 658.2624: \SystemRoot\System32\drivers\symevent64x86.sys: 
    127 658.2624:     CreationTime:    2015-04-08T09:25:49.025658700Z 
    128 658.2624:     LastWriteTime:   2015-06-02T08:16:03.334057100Z 
    129 658.2624:     ChangeTime:      2015-06-02T08:16:03.334057100Z 
    130 658.2624:     FileAttributes:  0x20 
    131 658.2624:     Size:            0x2b658 
    132 658.2624:     NT Headers:      0xe8 
    133 658.2624:     Timestamp:       0x51f32ff2 
    134 658.2624:     Machine:         0x8664 - amd64 
    135 658.2624:     Timestamp:       0x51f32ff2 
    136 658.2624:     Image Version:   6.0 
    137 658.2624:     SizeOfImage:     0x38000 (229376) 
    138 658.2624:     Resource Dir:    0x36000 LB 0x3c8 
    139 658.2624:     [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 
    140 658.2624:     [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 
    141 658.2624:     ProductName:     SYMEVENT 
    142 658.2624:     ProductVersion:  12.9.5.2 
    143 658.2624:     FileVersion:     12.9.5.2 
    144 658.2624:     FileDescription: Symantec Event Library 
    145 658.2624: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 
    146 658.2624: Calling main() 
    147 658.2624: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 
    148 658.2624: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 
    149 658.2624: SUPR3HardenedMain: Respawn #1 
    150 658.2624: System32:  \Device\HarddiskVolume2\Windows\System32 
    151 658.2624: WinSxS:    \Device\HarddiskVolume2\Windows\winsxs 
    152 658.2624: KnownDllPath: C:\Windows\system32 
    153 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 
    154 658.2624: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 
    155 658.2624: supR3HardNtEnableThreadCreation: 
    156 658.2624: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f3a360 pvNtTerminateThread=0000000076f5c260 
    157 658.2624: supR3HardenedWinDoReSpawn(1): New child 15a4.5e8 [kernel32]. 
    158 658.2624: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdf000 cbPeb=0x380 
    159 658.2624: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f10000 uNtDllChildAddr=0000000076f10000 
    160 658.2624: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f3a360 
    161 658.2624: supR3HardenedWinSetupChildInit: Start child. 
    162 658.2624: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms. 
    163 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps 
    164 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 
    165 658.2624:  *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 
    166 658.2624:  *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 
    167 658.2624:  *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 
    168 658.2624:   0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 
    169 658.2624:  *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 
    170 658.2624:   0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000 
    171 658.2624:  *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !! 
    172 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000) 
    173 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000] 
    174 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x1c0000 s=0x10000 ap=0x0 rp=0x00000000000001 
    175 658.2624:   0000000000061000-000000000021ffff 0x0001/0x0000 0x0000000 
    176 658.2624:  *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 
    177 658.2624:   000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 
    178 658.2624:   000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 
    179 658.2624:   0000000000320000-0000000071a9ffff 0x0001/0x0000 0x0000000 
    180 658.2624:  *0000000071aa0000-0000000071aa0fff 0x0040/0x0040 0x0020000 !! 
    181 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071aa0000 (LB 0x1000, 0000000071aa0000 LB 0x1000) 
    182 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071aa0000/0000000071aa0000 LB 0/0x1000] 
    183 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071aa0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    184 658.2624:   0000000071aa1000-0000000071aaffff 0x0001/0x0000 0x0000000 
    185 658.2624:  *0000000071ab0000-0000000071ab0fff 0x0040/0x0040 0x0020000 !! 
    186 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ab0000 (LB 0x1000, 0000000071ab0000 LB 0x1000) 
    187 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ab0000/0000000071ab0000 LB 0/0x1000] 
    188 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ab0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    189 658.2624:   0000000071ab1000-0000000071abffff 0x0001/0x0000 0x0000000 
    190 658.2624:  *0000000071ac0000-0000000071ac0fff 0x0040/0x0040 0x0020000 !! 
    191 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ac0000 (LB 0x1000, 0000000071ac0000 LB 0x1000) 
    192 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ac0000/0000000071ac0000 LB 0/0x1000] 
    193 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ac0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    194 658.2624:   0000000071ac1000-0000000071acffff 0x0001/0x0000 0x0000000 
    195 658.2624:  *0000000071ad0000-0000000071ad0fff 0x0040/0x0040 0x0020000 !! 
    196 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ad0000 (LB 0x1000, 0000000071ad0000 LB 0x1000) 
    197 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ad0000/0000000071ad0000 LB 0/0x1000] 
    198 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ad0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    199 658.2624:   0000000071ad1000-0000000071adffff 0x0001/0x0000 0x0000000 
    200 658.2624:  *0000000071ae0000-0000000071ae0fff 0x0040/0x0040 0x0020000 !! 
    201 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071ae0000 (LB 0x1000, 0000000071ae0000 LB 0x1000) 
    202 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071ae0000/0000000071ae0000 LB 0/0x1000] 
    203 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071ae0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    204 658.2624:   0000000071ae1000-0000000071aeffff 0x0001/0x0000 0x0000000 
    205 658.2624:  *0000000071af0000-0000000071af0fff 0x0040/0x0040 0x0020000 !! 
    206 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071af0000 (LB 0x1000, 0000000071af0000 LB 0x1000) 
    207 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071af0000/0000000071af0000 LB 0/0x1000] 
    208 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071af0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001 
    209 658.2624:   0000000071af1000-0000000071afffff 0x0001/0x0000 0x0000000 
    210 658.2624:  *0000000071b00000-0000000071b00fff 0x0040/0x0040 0x0020000 !! 
    211 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000071b00000 (LB 0x1000, 0000000071b00000 LB 0x1000) 
    212 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000071b00000/0000000071b00000 LB 0/0x1000] 
    213 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000071b00000 LB 0x5410000 s=0x10000 ap=0x0 rp=0x00000000000001 
    214 658.2624:   0000000071b01000-0000000076f0ffff 0x0001/0x0000 0x0000000 
    215 658.2624:  *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    216 658.2624:   0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    217 658.2624:   000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    218 658.2624:   000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    219 658.2624:   0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    220 658.2624:   0000000077048000-000000007704afff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    221 658.2624:   000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    222 658.2624:   00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 
    223 658.2624:  *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 
    224 658.2624:  *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 
    225 658.2624:   000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 
    226 658.2624:   000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 
    227 658.2624:  *000000013fde0000-000000013fde0fff 0x0040/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    228 658.2624:   000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    229 658.2624:   000000013fe51000-000000013fe51fff 0x0080/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    230 658.2624:   000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    231 658.2624:   000000013fe97000-000000013fe97fff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    232 658.2624:   000000013fe98000-000000013fe98fff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    233 658.2624:   000000013fe99000-000000013fe9dfff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    234 658.2624:   000000013fe9e000-000000013fe9efff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    235 658.2624:   000000013fe9f000-000000013fe9ffff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    236 658.2624:   000000013fea0000-000000013fea3fff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    237 658.2624:   000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    238 658.2624:   000000013feec000-000000013feeffff 0x0001/0x0000 0x0000000 
    239 658.2624:  *000000013fef0000-000000013fef0fff 0x0040/0x0040 0x0020000 !! 
    240 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013fef0000 (LB 0x1000, 000000013fef0000 LB 0x1000) 
    241 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013fef0000/000000013fef0000 LB 0/0x1000] 
    242 658.2624: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013fef0000 LB 0x7fdbf340000 s=0x10000 ap=0x0 rp=0x00000000000001 
    243 658.2624:   000000013fef1000-000007feff22ffff 0x0001/0x0000 0x0000000 
    244 658.2624:  *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 
    245 658.2624:   000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 
    246 658.2624:  *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 
    247 658.2624:   000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 
    248 658.2624:  *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 
    249 658.2624:  *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 
    250 658.2624:  *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 
    251 658.2624: apisetschema.dll: timestamp 0x590296af (rc=VINF_SUCCESS) 
    252 658.2624: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS) 
    253 658.2624: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 
    254 658.2624: VirtualBox.exe: Differences in section #0 (headers) between file and memory: 
    255 658.2624:   000000013fde0162 / 0x0000162: 00 != 11 
    256 658.2624:   000000013fde0164 / 0x0000164: 00 != b8 
    257 658.2624:   000000013fde0165 / 0x0000165: 00 != 01 
    258 658.2624:   000000013fde01b8 / 0x00001b8: 00 != b8 
    259 658.2624:   000000013fde01b9 / 0x00001b9: 00 != 01 
    260 658.2624:   000000013fde01ba / 0x00001ba: 00 != 11 
    261 658.2624:   000000013fde01bc / 0x00001bc: 00 != 20 
    262 658.2624:   Restored 0x400 bytes of original file content at 000000013fde0000 
    263 658.2624: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports 
    264 658.2624: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports 
    265 658.2624: ntdll.dll: Differences in section #1 (.text) between file and memory: 
    266 658.2624:   0000000076f5d540 / 0x004d540: 4c != e9 
    267 658.2624:   0000000076f5d541 / 0x004d541: 8b != bb 
    268 658.2624:   0000000076f5d542 / 0x004d542: d1 != 2a 
    269 658.2624:   0000000076f5d543 / 0x004d543: b8 != b4 
    270 658.2624:   0000000076f5d544 / 0x004d544: 7e != fa 
    271 658.2624:   Restored 0x2000 bytes of original file content at 0000000076f5c36e 
    272 658.2624: supR3HardNtChildPurify: cFixes=11 g_fSupAdversaries=0x3 cPatchCount=0 
    273 658.2624: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps 
    274 658.2624: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 
    275 658.2624:  *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 
    276 658.2624:  *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 
    277 658.2624:  *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 
    278 658.2624:   0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 
    279 658.2624:  *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 
    280 658.2624:   0000000000041000-000000000021ffff 0x0001/0x0000 0x0000000 
    281 658.2624:  *0000000000220000-000000000031bfff 0x0000/0x0004 0x0020000 
    282 658.2624:   000000000031c000-000000000031dfff 0x0104/0x0004 0x0020000 
    283 658.2624:   000000000031e000-000000000031ffff 0x0004/0x0004 0x0020000 
    284 658.2624:   0000000000320000-0000000076f0ffff 0x0001/0x0000 0x0000000 
    285 658.2624:  *0000000076f10000-0000000076f10fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    286 658.2624:   0000000076f11000-000000007700dfff 0x0020/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    287 658.2624:   000000007700e000-000000007703cfff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    288 658.2624:   000000007703d000-0000000077046fff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    289 658.2624:   0000000077047000-0000000077047fff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    290 658.2624:   0000000077048000-0000000077048fff 0x0008/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    291 658.2624:   0000000077049000-000000007704afff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    292 658.2624:   000000007704b000-00000000770b9fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\ntdll.dll 
    293 658.2624:   00000000770ba000-000000007efdffff 0x0001/0x0000 0x0000000 
    294 658.2624:  *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 
    295 658.2624:  *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 
    296 658.2624:   000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 
    297 658.2624:   000000007fff0000-000000013fddffff 0x0001/0x0000 0x0000000 
    298 658.2624:  *000000013fde0000-000000013fde0fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    299 658.2624:   000000013fde1000-000000013fe50fff 0x0020/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    300 658.2624:   000000013fe51000-000000013fe51fff 0x0040/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    301 658.2624:   000000013fe52000-000000013fe96fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    302 658.2624:   000000013fe97000-000000013fea3fff 0x0004/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    303 658.2624:   000000013fea4000-000000013feebfff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 
    304 658.2624:   000000013feec000-000007feff22ffff 0x0001/0x0000 0x0000000 
    305 658.2624:  *000007feff230000-000007feff230fff 0x0002/0x0080 0x1000000  \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 
    306 658.2624:   000007feff231000-000007fffffaffff 0x0001/0x0000 0x0000000 
    307 658.2624:  *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 
    308 658.2624:   000007fffffd3000-000007fffffdcfff 0x0001/0x0000 0x0000000 
    309 658.2624:  *000007fffffdd000-000007fffffdefff 0x0004/0x0004 0x0020000 
    310 658.2624:  *000007fffffdf000-000007fffffdffff 0x0004/0x0004 0x0020000 
    311 658.2624:  *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 
    312 658.2624: supR3HardNtChildPurify: Done after 4786 ms and 11 fixes (loop #1). 
    313 658.2624: supR3HardNtEnableThreadCreation: 
    314 15a4.5e8: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100 
    315 15a4.5e8: supR3HardenedVmProcessInit: uNtDllAddr=0000000076f10000 g_uNtVerCombined=0x611db100 
    316 15a4.5e8: ntdll.dll: timestamp 0x590296ce (rc=VINF_SUCCESS) 
    317 15a4.5e8: New simple heap: #1 0000000000320000 LB 0x400000 (for 1744896 allocation) 
    318 15a4.5e8: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 
    319 15a4.5e8: System32:  \Device\HarddiskVolume2\Windows\System32 
    320 15a4.5e8: WinSxS:    \Device\HarddiskVolume2\Windows\winsxs 
    321 15a4.5e8: KnownDllPath: C:\Windows\system32 
    322 15a4.5e8: supR3HardenedVmProcessInit: Opening vboxdrv stub... 
    323 15a4.5e8: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 
    324 15a4.5e8: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 
    325 15a4.5e8: Registered Dll notification callback with NTDLL. 
    326 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) 
    327 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll 
    328 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling] 
    329 15a4.5e8: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 
    330 15a4.5e8: supR3HardenedDllNotificationCallback: load   0000000076df0000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0] 
    331 15a4.5e8: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 
    332 15a4.5e8: supR3HardenedDllNotificationCallback: load   000007fefcc60000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0] 
    333 15a4.5e8: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) 
    334 15a4.5e8: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll 
    335 15a4.5e8: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076df0000 'C:\Windows\system32\kernel32.dll' 
    336 658.2624: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 796 ms, CloseEvents); 
    337  
    338  
    339 Robert  
     3(removed pasted log) 

www.oracle.com
ContactPrivacy policyTerms of Use