- Code: Select all Expand viewCollapse view
c94.374: Log file opened: 4.3.15r95226 g_hStartupLog=000017d0 g_uNtVerCombined=0x510a2830
c94.374: Calling main()
c94.374: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x0
c94.374: SUPR3HardenedMain: Respawn #1
c94.374: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\PROGRAMS\Oracle\VirtualBox\VirtualBox.exe)
c94.374: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\PROGRAMS\Oracle\VirtualBox\VirtualBox.dll)
c94.374: supR3HardenedWinDoReSpawn(1): New child bc4.19c [kernel32].
c94.374: supR3HardenedWinPurifyChild: PebBaseAddress=7ffdf000 cbPeb=0x20c
c94.374: supR3HardNtPuChFindNtdll: uNtDllParentAddr=7c900000 uNtDllChildAddr=7c900000
c94.374: supR3HardNtPuChTriggerInitialImageEvents: pvLdrInitThunk=7c901166 pvNtTerminateThread=7c90de7e
c94.374: supR3HardNtPuChSanitizeImage: 00400000 '\Device\HarddiskVolume1\PROGRAMS\Oracle\VirtualBox\VirtualBox.exe'
c94.374: supR3HardNtPuChSanitizeMemory: Freeing exec mem at 71b00000 (71b00000 LB 0x1000)
c94.374: supR3HardNtPuChSanitizeImage: 7c900000 '\Device\HarddiskVolume1\WIN\system32\ntdll.dll'
c94.374: supR3HardenedWinDoReSpawn(1): Quitting: ExitCode=0xc0000005 rcNt=0x0
Host: Windows XP SP3, with application injectors: Comodo Firewall (guard32.dll) and WindowFX (wfx.dll)