I created a Debian Linux VM in June 2015 using VirtualBox v4.3.28. Shortly afterwards I uninstalled VirtualBox but kept the VM files. I am running Windows 7 Pro 64-bit, and I'm on the same system that originally created the VM.
I have now installed VirtualBox again and when I click 'Start' on the VM I get a popup box with a title of "VirtualBox - Error In supR3HardNtChildPurify" which contains "supHardenedWinVerifyProcess failed with VERR_SUP_VP_KERNEL32_ALREADY_MAPPED: (rc = -5663)"
I've struggled to find a clear discussion that matches this problem although I've seen some comments suggesting that the problem is that KERNEL32.DLL has been patched since the VM was created. I have been applying Windows updates as they've arrived.
I've included the full VBoxStartup.log below. I've also tried installing VirtualBox v5.0 and I get the same error with that. I uninstalled v5.0 and returned back to v4.3.28.
I'd be most appreciative if someone could help me get this VM working again.
Cheers,
Mark
Code: Select all
3568.1f6c: Log file opened: 4.3.28r100309 g_hStartupLog=00000000000000e8 g_uNtVerCombined=0x611db110
3568.1f6c: \SystemRoot\System32\ntdll.dll:
3568.1f6c: CreationTime: 2016-01-18T18:21:13.099762100Z
3568.1f6c: LastWriteTime: 2015-12-30T19:05:33.659216000Z
3568.1f6c: ChangeTime: 2016-01-19T18:13:43.054756300Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x1a67c0
3568.1f6c: NT Headers: 0xe0
3568.1f6c: Timestamp: 0x568429e5
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x568429e5
3568.1f6c: Image Version: 6.1
3568.1f6c: SizeOfImage: 0x1a9000 (1740800)
3568.1f6c: Resource Dir: 0x14d000 LB 0x5a028
3568.1f6c: ProductName: Microsoft® Windows® Operating System
3568.1f6c: ProductVersion: 6.1.7601.19110
3568.1f6c: FileVersion: 6.1.7601.19110 (win7sp1_gdr.151230-0600)
3568.1f6c: FileDescription: NT Layer DLL
3568.1f6c: \SystemRoot\System32\kernel32.dll:
3568.1f6c: CreationTime: 2016-01-18T18:21:13.001756500Z
3568.1f6c: LastWriteTime: 2015-12-30T18:57:55.730000000Z
3568.1f6c: ChangeTime: 2016-01-19T18:13:43.935806700Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x11c000
3568.1f6c: NT Headers: 0xe8
3568.1f6c: Timestamp: 0x568429dc
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x568429dc
3568.1f6c: Image Version: 6.1
3568.1f6c: SizeOfImage: 0x11f000 (1175552)
3568.1f6c: Resource Dir: 0x116000 LB 0x528
3568.1f6c: ProductName: Microsoft® Windows® Operating System
3568.1f6c: ProductVersion: 6.1.7601.19110
3568.1f6c: FileVersion: 6.1.7601.19110 (win7sp1_gdr.151230-0600)
3568.1f6c: FileDescription: Windows NT BASE API Client DLL
3568.1f6c: \SystemRoot\System32\KernelBase.dll:
3568.1f6c: CreationTime: 2016-01-18T18:21:14.710854300Z
3568.1f6c: LastWriteTime: 2015-12-30T18:57:55.761000000Z
3568.1f6c: ChangeTime: 2016-01-19T18:13:43.939807000Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x67a00
3568.1f6c: NT Headers: 0xe8
3568.1f6c: Timestamp: 0x568429dd
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x568429dd
3568.1f6c: Image Version: 6.1
3568.1f6c: SizeOfImage: 0x6c000 (442368)
3568.1f6c: Resource Dir: 0x6a000 LB 0x530
3568.1f6c: ProductName: Microsoft® Windows® Operating System
3568.1f6c: ProductVersion: 6.1.7601.19110
3568.1f6c: FileVersion: 6.1.7601.19110 (win7sp1_gdr.151230-0600)
3568.1f6c: FileDescription: Windows NT BASE API Client DLL
3568.1f6c: \SystemRoot\System32\apisetschema.dll:
3568.1f6c: CreationTime: 2016-01-18T18:21:21.323232500Z
3568.1f6c: LastWriteTime: 2015-12-30T18:54:58.839000000Z
3568.1f6c: ChangeTime: 2016-01-19T18:13:43.031755000Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x1a00
3568.1f6c: NT Headers: 0xc0
3568.1f6c: Timestamp: 0x568428c9
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x568428c9
3568.1f6c: Image Version: 6.1
3568.1f6c: SizeOfImage: 0x50000 (327680)
3568.1f6c: Resource Dir: 0x30000 LB 0x3f8
3568.1f6c: ProductName: Microsoft® Windows® Operating System
3568.1f6c: ProductVersion: 6.1.7601.19110
3568.1f6c: FileVersion: 6.1.7601.19110 (win7sp1_gdr.151230-0600)
3568.1f6c: FileDescription: ApiSet Schema DLL
3568.1f6c: Found driver SysPlant (0x1)
3568.1f6c: Found driver SymNetS (0x2)
3568.1f6c: Found driver SymDS (0x2)
3568.1f6c: Found driver SRTSPX (0x2)
3568.1f6c: Found driver SymEvent (0x2)
3568.1f6c: Found driver SymIRON (0x2)
3568.1f6c: supR3HardenedWinFindAdversaries: 0x3
3568.1f6c: \SystemRoot\System32\drivers\SysPlant.sys:
3568.1f6c: CreationTime: 2014-03-13T17:46:13.448022700Z
3568.1f6c: LastWriteTime: 2014-03-13T17:46:13.463622800Z
3568.1f6c: ChangeTime: 2014-03-13T17:46:13.463622800Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x25ed8
3568.1f6c: NT Headers: 0x100
3568.1f6c: Timestamp: 0x52647ffd
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x52647ffd
3568.1f6c: Image Version: 5.0
3568.1f6c: SizeOfImage: 0x2e000 (188416)
3568.1f6c: Resource Dir: 0x2c000 LB 0x498
3568.1f6c: ProductName: Symantec CMC Firewall
3568.1f6c: ProductVersion: 12.1.4013.4013
3568.1f6c: FileVersion: 12.1.4013.4013
3568.1f6c: FileDescription: Symantec CMC Firewall SysPlant
3568.1f6c: \SystemRoot\System32\sysfer.dll:
3568.1f6c: CreationTime: 2014-03-13T17:46:13.385622600Z
3568.1f6c: LastWriteTime: 2014-03-13T17:46:13.416822700Z
3568.1f6c: ChangeTime: 2014-03-13T17:46:13.416822700Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x70190
3568.1f6c: NT Headers: 0xe8
3568.1f6c: Timestamp: 0x526480b2
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x526480b2
3568.1f6c: Image Version: 0.0
3568.1f6c: SizeOfImage: 0x87000 (552960)
3568.1f6c: Resource Dir: 0x85000 LB 0x630
3568.1f6c: ProductName: Symantec CMC Firewall
3568.1f6c: ProductVersion: 12.1.4013.4013
3568.1f6c: FileVersion: 12.1.4013.4013
3568.1f6c: FileDescription: Symantec CMC Firewall sysfer
3568.1f6c: \SystemRoot\System32\sysferThunk.dll:
3568.1f6c: CreationTime: 2014-03-13T17:46:13.416822700Z
3568.1f6c: LastWriteTime: 2014-03-13T17:46:13.448022700Z
3568.1f6c: ChangeTime: 2014-03-13T17:46:13.448022700Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x2f90
3568.1f6c: NT Headers: 0xd0
3568.1f6c: Timestamp: 0x526480b3
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x526480b3
3568.1f6c: Image Version: 0.0
3568.1f6c: SizeOfImage: 0x8000 (32768)
3568.1f6c: Resource Dir: 0x6000 LB 0x648
3568.1f6c: ProductName: Symantec CMC Firewall
3568.1f6c: ProductVersion: 12.1.4013.4013
3568.1f6c: FileVersion: 12.1.4013.4013
3568.1f6c: FileDescription: Symantec CMC Firewall SysferThunk
3568.1f6c: \SystemRoot\System32\drivers\symevent64x86.sys:
3568.1f6c: CreationTime: 2012-05-28T20:16:12.421875000Z
3568.1f6c: LastWriteTime: 2014-03-13T17:42:21.765888100Z
3568.1f6c: ChangeTime: 2014-03-13T17:42:21.765888100Z
3568.1f6c: FileAttributes: 0x20
3568.1f6c: Size: 0x2b658
3568.1f6c: NT Headers: 0xe8
3568.1f6c: Timestamp: 0x51f32ff2
3568.1f6c: Machine: 0x8664 - amd64
3568.1f6c: Timestamp: 0x51f32ff2
3568.1f6c: Image Version: 6.0
3568.1f6c: SizeOfImage: 0x38000 (229376)
3568.1f6c: Resource Dir: 0x36000 LB 0x3c8
3568.1f6c: ProductName: SYMEVENT
3568.1f6c: ProductVersion: 12.9.5.2
3568.1f6c: FileVersion: 12.9.5.2
3568.1f6c: FileDescription: Symantec Event Library
3568.1f6c: Calling main()
3568.1f6c: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
3568.1f6c: SUPR3HardenedMain: Respawn #1
3568.1f6c: System32: \Device\HarddiskVolume1\Windows\System32
3568.1f6c: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
3568.1f6c: KnownDllPath: C:\windows\system32
3568.1f6c: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
3568.1f6c: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
3568.1f6c: supR3HardNtEnableThreadCreation:
3568.1f6c: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076f9b630 pvNtTerminateThread=0000000076fbdee0
3568.1f6c: supR3HardenedWinDoReSpawn(1): New child 244c.2784 [kernel32].
3568.1f6c: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd8000 cbPeb=0x380
3568.1f6c: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076f70000 uNtDllChildAddr=0000000076f70000
3568.1f6c: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076f9b630
3568.1f6c: supR3HardenedWinSetupChildInit: Start child.
3568.1f6c: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
3568.1f6c: supR3HardNtChildPurify: Startup delay kludge #1/0: 520 ms, 65 sleeps
3568.1f6c: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
3568.1f6c: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000010000-ffffffffffffffff 0x0004/0x0004 0x0040000
3568.1f6c: *0000000000020000-000000000001efff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000021000-0000000000011fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000030000-0000000000027fff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000030000 (LB 0x8000, 0000000000030000 LB 0x8000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000030000/0000000000030000 LB 0/0x8000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000030000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
3568.1f6c: 0000000000038000-000000000002ffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000051000-0000000000041fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000060000-000000000005efff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
3568.1f6c: 0000000000061000-0000000000051fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000070000-0000000000008fff 0x0002/0x0002 0x0040000
3568.1f6c: 00000000000d7000-00000000000cdfff 0x0001/0x0000 0x0000000
3568.1f6c: *00000000000e0000-00000000000d8fff 0x0004/0x0004 0x0020000
3568.1f6c: 00000000000e7000-00000000000ddfff 0x0000/0x0004 0x0020000
3568.1f6c: *00000000000f0000-00000000000eefff 0x0002/0x0002 0x0040000
3568.1f6c: 00000000000f1000-00000000000e1fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000100000-00000000000fefff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000101000-00000000000f1fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000110000-000000000010efff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000111000-0000000000101fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000120000-000000000011efff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000121000-0000000000111fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000130000-0000000000122fff 0x0008/0x0008 0x0040000
3568.1f6c: 000000000013d000-0000000000109fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000170000-0000000000073fff 0x0000/0x0004 0x0020000
3568.1f6c: 000000000026c000-0000000000268fff 0x0104/0x0004 0x0020000
3568.1f6c: 000000000026f000-000000000026dfff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000270000-000000000024ffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000290000-000000000028bfff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000294000-0000000000217fff 0x0000/0x0004 0x0020000
3568.1f6c: 0000000000310000-00000000002fffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000320000-000000000022dfff 0x0000/0x0004 0x0020000
3568.1f6c: 0000000000412000-000000000040ffff 0x0104/0x0004 0x0020000
3568.1f6c: 0000000000414000-0000000000407fff 0x0004/0x0004 0x0020000
3568.1f6c: *0000000000420000-0000000000376fff 0x0004/0x0004 0x0020000
3568.1f6c: 00000000004c9000-0000000000471fff 0x0000/0x0004 0x0020000
3568.1f6c: *0000000000520000-0000000000489fff 0x0004/0x0004 0x0020000
3568.1f6c: 00000000005b6000-000000000054bfff 0x0000/0x0004 0x0020000
3568.1f6c: *0000000000620000-000000000051dfff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000722000-0000000000713fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000730000-00000000006c7fff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000798000-00000000006fffff 0x0000/0x0004 0x0020000
3568.1f6c: 0000000000830000-00000000007dffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000880000-0000000000876fff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000000889000-0000000000881fff 0x0000/0x0004 0x0020000
3568.1f6c: 0000000000890000-000000000086ffff 0x0001/0x0000 0x0000000
3568.1f6c: *00000000008b0000-00000000008a7fff 0x0004/0x0004 0x0020000
3568.1f6c: 00000000008b8000-00000000008affff 0x0000/0x0004 0x0020000
3568.1f6c: *00000000008c0000-00000000008a4fff 0x0002/0x0002 0x0040000
3568.1f6c: 00000000008db000-0000000000775fff 0x0000/0x0002 0x0040000
3568.1f6c: 0000000000a40000-0000000000a3cfff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000a43000-0000000000a3dfff 0x0000/0x0002 0x0040000
3568.1f6c: 0000000000a48000-0000000000a3ffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000a50000-00000000008cefff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000bd1000-0000000000bc1fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000000be0000-00000000009c2fff 0x0002/0x0002 0x0040000
3568.1f6c: 0000000000dfd000-ffffffffffc19fff 0x0000/0x0002 0x0040000
3568.1f6c: 0000000001fe0000-0000000001faffff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000002010000-0000000002009fff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000002016000-0000000001f9bfff 0x0000/0x0004 0x0020000
3568.1f6c: *0000000002090000-0000000002027fff 0x0004/0x0004 0x0020000
3568.1f6c: 00000000020f8000-000000000205ffff 0x0000/0x0004 0x0020000
3568.1f6c: *0000000002190000-0000000001ec0fff 0x0002/0x0002 0x0040000
3568.1f6c: 000000000245f000-000000000242dfff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000002490000-0000000002393fff 0x0000/0x0004 0x0020000
3568.1f6c: 000000000258c000-0000000002589fff 0x0104/0x0004 0x0020000
3568.1f6c: 000000000258e000-000000000258bfff 0x0004/0x0004 0x0020000
3568.1f6c: 0000000002590000-ffffffff9726ffff 0x0001/0x0000 0x0000000
3568.1f6c: *000000006d8b0000-000000006d8b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\NVIDIA Corporation\coprocmanager\detoured.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000000006d8b0000 (000000006d8b0000 LB 0x1000) - 'detoured.dll'
3568.1f6c: 000000006d8b1000-000000006b781fff 0x0001/0x0000 0x0000000
3568.1f6c: *000000006f9e0000-000000006f9e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files (x86)\Blue Coat\ProxyClient\proxyclient64.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000000006f9e0000 (000000006f9e0000 LB 0x1000) - 'proxyclient64.dll'
3568.1f6c: 000000006f9e1000-000000006f3d1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000000006fff0000-000000006ffdffff 0x0020/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000006fff0000 (LB 0x10000, 000000006fff0000 LB 0x10000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000006fff0000/000000006fff0000 LB 0/0x10000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000006fff0000 LB 0x4a20000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 0000000070000000-000000006b5effff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000074a10000-0000000074a10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\sysfer.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000074a10000 (0000000074a10000 LB 0x1000) - 'sysfer.dll'
3568.1f6c: 0000000074a11000-00000000726e1fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000076d40000-0000000076d2ffff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000076d40000 (LB 0x10000, 0000000076d40000 LB 0x10000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000076d40000/0000000076d40000 LB 0/0x10000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000076d40000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: *0000000076d50000-0000000076d50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076d51000-0000000076d6cfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076d6d000-0000000076d6dfff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076d6e000-0000000076debfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076dec000-0000000076e59fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076e5a000-0000000076e5bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076e5c000-0000000076e6efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\kernel32.dll
3568.1f6c: 0000000076e6f000-0000000076e6dfff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000076e70000-0000000076e70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\user32.dll
3568.1f6c: 0000000076e71000-0000000076ef1fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\user32.dll
3568.1f6c: 0000000076ef2000-0000000076f01fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\user32.dll
3568.1f6c: 0000000076f02000-0000000076f03fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\user32.dll
3568.1f6c: 0000000076f04000-0000000076f69fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\user32.dll
3568.1f6c: 0000000076f6a000-0000000076f63fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000076f70000-0000000076f70fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 0000000076f71000-0000000076f95fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 0000000076f96000-0000000076f96fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 0000000076f97000-000000007706efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 000000007706f000-000000007709dfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 000000007709e000-000000007709efff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 000000007709f000-000000007709ffff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a0000-00000000770a0fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a1000-00000000770a2fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a3000-00000000770a3fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a4000-00000000770a4fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a5000-00000000770a6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a7000-00000000770a7fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770a8000-00000000770a9fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 00000000770aa000-0000000077118fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
3568.1f6c: 0000000077119000-0000000077111fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000077120000-000000007711dfff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000077120000 (LB 0x2000, 0000000077120000 LB 0x2000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000077120000/0000000077120000 LB 0/0x2000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000077120000 LB 0x20000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 0000000077122000-0000000077103fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000077140000-0000000077140fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\psapi.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000077140000 (0000000077140000 LB 0x1000) - 'psapi.dll'
3568.1f6c: 0000000077141000-000000006f2a1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000000007efe0000-000000007efdafff 0x0002/0x0002 0x0040000
3568.1f6c: 000000007efe5000-000000007eee9fff 0x0000/0x0002 0x0040000
3568.1f6c: *000000007f0e0000-000000007e1dffff 0x0000/0x0002 0x0020000
3568.1f6c: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
3568.1f6c: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
3568.1f6c: 000000007fff0000-ffffffffc082ffff 0x0001/0x0000 0x0000000
3568.1f6c: *000000013f7b0000-000000013f7b0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f7b1000-000000013f835fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f836000-000000013f836fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f837000-000000013f874fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f875000-000000013f875fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f876000-000000013f876fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f877000-000000013f878fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f879000-000000013f879fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f87a000-000000013f87afff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f87b000-000000013f87efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f87f000-000000013f8b7fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
3568.1f6c: 000000013f8b8000-000000013f8affff 0x0001/0x0000 0x0000000
3568.1f6c: *000000013f8c0000-000000013f8befff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000000013f8c0000 (LB 0x1000, 000000013f8c0000 LB 0x1000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000000013f8c0000/000000013f8c0000 LB 0/0x1000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000000013f8c0000 LB 0x40740000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 000000013f8c1000-00000000ff181fff 0x0001/0x0000 0x0000000
3568.1f6c: *0000000180000000-0000000180000fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files (x86)\Blue Coat\ProxyClient\EasyHook64.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000180000000 (0000000180000000 LB 0x1000) - 'EasyHook64.dll'
3568.1f6c: 0000000180001000-fffff8040e0e1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fef1f20000-000007fef1f20fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\NVIDIA Corporation\coprocmanager\nvdxgiwrapx.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fef1f20000 (000007fef1f20000 LB 0x1000) - 'nvdxgiwrapx.dll'
3568.1f6c: 000007fef1f21000-000007fef1911fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fef2530000-000007fef2530fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\NVIDIA Corporation\coprocmanager\nvd3d9wrapx.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fef2530000 (000007fef2530000 LB 0x1000) - 'nvd3d9wrapx.dll'
3568.1f6c: 000007fef2531000-000007feea081fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefa9e0000-000007fefa9e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\wkscli.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefa9e0000 (000007fefa9e0000 LB 0x1000) - 'wkscli.dll'
3568.1f6c: 000007fefa9e1000-000007fefa9c1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefaa00000-000007fefaa00fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\netutils.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefaa00000 (000007fefaa00000 LB 0x1000) - 'netutils.dll'
3568.1f6c: 000007fefaa01000-000007fefa9f1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefaa10000-000007fefaa10fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\netapi32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefaa10000 (000007fefaa10000 LB 0x1000) - 'netapi32.dll'
3568.1f6c: 000007fefaa11000-000007fefa9f1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefaa30000-000007fefaa2dfff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefaa30000 (LB 0x2000, 000007fefaa30000 LB 0x2000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefaa30000/000007fefaa30000 LB 0/0x2000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefaa30000 LB 0x1dd0000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 000007fefaa32000-000007fef8c63fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefc800000-000007fefc7effff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefc800000 (LB 0x10000, 000007fefc800000 LB 0x10000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefc800000/000007fefc800000 LB 0/0x10000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefc800000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: *000007fefc810000-000007fefc7fffff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefc810000 (LB 0x10000, 000007fefc810000 LB 0x10000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefc810000/000007fefc810000 LB 0/0x10000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefc810000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: *000007fefc820000-000007fefc820fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\srvcli.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefc820000 (000007fefc820000 LB 0x1000) - 'srvcli.dll'
3568.1f6c: 000007fefc821000-000007fefc411fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefcc30000-000007fefcc30fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\version.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefcc30000 (000007fefcc30000 LB 0x1000) - 'version.dll'
3568.1f6c: 000007fefcc31000-000007fefcc21fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefcc40000-000007fefcc40fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\nvinitx.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefcc40000 (000007fefcc40000 LB 0x1000) - 'nvinitx.dll'
3568.1f6c: 000007fefcc41000-000007fefca41fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefce40000-000007fefce2ffff 0x0020/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefce40000 (LB 0x10000, 000007fefce40000 LB 0x10000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefce40000/000007fefce40000 LB 0/0x10000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefce40000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: *000007fefce50000-000007fefce50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
3568.1f6c: 000007fefce51000-000007fefce9afff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
3568.1f6c: 000007fefce9b000-000007fefceb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
3568.1f6c: 000007fefceb1000-000007fefceb2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
3568.1f6c: 000007fefceb3000-000007fefcebbfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
3568.1f6c: 000007fefcebc000-000007fefcd17fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd060000-000007fefd060fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\cfgmgr32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd060000 (000007fefd060000 LB 0x1000) - 'cfgmgr32.dll'
3568.1f6c: 000007fefd061000-000007fefd021fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd0a0000-000007fefd0a0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\devobj.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd0a0000 (000007fefd0a0000 LB 0x1000) - 'devobj.dll'
3568.1f6c: 000007fefd0a1000-000007fefd071fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd0d0000-000007fefd0d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\advapi32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd0d0000 (000007fefd0d0000 LB 0x1000) - 'advapi32.dll'
3568.1f6c: 000007fefd0d1000-000007fefcd21fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd480000-000007fefd480fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\msvcrt.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd480000 (000007fefd480000 LB 0x1000) - 'msvcrt.dll'
3568.1f6c: 000007fefd481000-000007fefd3e1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd520000-000007fefd520fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\lpk.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd520000 (000007fefd520000 LB 0x1000) - 'lpk.dll'
3568.1f6c: 000007fefd521000-000007fefd411fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd630000-000007fefd630fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\msctf.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd630000 (000007fefd630000 LB 0x1000) - 'msctf.dll'
3568.1f6c: 000007fefd631000-000007fefd521fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefd740000-000007fefd740fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\imm32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd740000 (000007fefd740000 LB 0x1000) - 'imm32.dll'
3568.1f6c: 000007fefd741000-000007fefd3a1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdae0000-000007fefdae0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\setupapi.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdae0000 (000007fefdae0000 LB 0x1000) - 'setupapi.dll'
3568.1f6c: 000007fefdae1000-000007fefd901fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdcc0000-000007fefdcc0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\sechost.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdcc0000 (000007fefdcc0000 LB 0x1000) - 'sechost.dll'
3568.1f6c: 000007fefdcc1000-000007fefdca1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdce0000-000007fefdce0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\gdi32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdce0000 (000007fefdce0000 LB 0x1000) - 'gdi32.dll'
3568.1f6c: 000007fefdce1000-000007fefdc71fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdd50000-000007fefdd50fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\nsi.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdd50000 (000007fefdd50000 LB 0x1000) - 'nsi.dll'
3568.1f6c: 000007fefdd51000-000007fefdd41fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdd60000-000007fefdd60fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\oleaut32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdd60000 (000007fefdd60000 LB 0x1000) - 'oleaut32.dll'
3568.1f6c: 000007fefdd61000-000007fefdbe1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefdee0000-000007fefdee0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ole32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdee0000 (000007fefdee0000 LB 0x1000) - 'ole32.dll'
3568.1f6c: 000007fefdee1000-000007fefdcd1fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefe0f0000-000007fefe0f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\usp10.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe0f0000 (000007fefe0f0000 LB 0x1000) - 'usp10.dll'
3568.1f6c: 000007fefe0f1000-000007fefe021fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefe1c0000-000007fefe1c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ws2_32.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe1c0000 (000007fefe1c0000 LB 0x1000) - 'ws2_32.dll'
3568.1f6c: 000007fefe1c1000-000007fefe171fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefe210000-000007fefe20dfff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefe210000 (LB 0x2000, 000007fefe210000 LB 0x2000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefe210000/000007fefe210000 LB 0/0x2000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefe210000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 000007fefe212000-000007fefe203fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fefe220000-000007fefe21dfff 0x0040/0x0040 0x0020000 !!
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefe220000 (LB 0x2000, 000007fefe220000 LB 0x2000)
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefe220000/000007fefe220000 LB 0/0x2000]
3568.1f6c: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefe220000 LB 0xf30000 s=0x10000 ap=0x0 rp=0x00000100000001
3568.1f6c: 000007fefe222000-000007fefd2f3fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007feff150000-000007feff150fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\rpcrt4.dll
3568.1f6c: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feff150000 (000007feff150000 LB 0x1000) - 'rpcrt4.dll'
3568.1f6c: 000007feff151000-000007feff011fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007feff290000-000007feff290fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
3568.1f6c: 000007feff291000-000007fdfe571fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
3568.1f6c: 000007fffffd3000-000007fffffcdfff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fffffd8000-000007fffffd6fff 0x0004/0x0004 0x0020000
3568.1f6c: 000007fffffd9000-000007fffffd7fff 0x0001/0x0000 0x0000000
3568.1f6c: *000007fffffda000-000007fffffd7fff 0x0004/0x0004 0x0020000
3568.1f6c: *000007fffffdc000-000007fffffd9fff 0x0004/0x0004 0x0020000
3568.1f6c: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
3568.1f6c: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
3568.1f6c: apisetschema.dll: timestamp 0x568428c9 (rc=VINF_SUCCESS)
3568.1f6c: kernelbase.dll: timestamp 0x568429dd (rc=VINF_SUCCESS)
3568.1f6c: VirtualBox.exe: timestamp 0x555369a5 (rc=VINF_SUCCESS)
3568.1f6c: user32.dll: timestamp 0x56423d2a (rc=VINF_SUCCESS)
3568.1f6c: kernel32.dll: timestamp 0x568429dc (rc=VINF_SUCCESS)
3568.1f6c: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
3568.1f6c: Error (rc=-5663):
3568.1f6c: The process already has KERNEL32.DLL loaded.
3568.1f6c: Error (rc=-5663):
3568.1f6c: supHardenedWinVerifyProcess failed with Unknown Status -5663 (0xffffe9e1): The process already has KERNEL32.DLL loaded.
3568.1f6c: Error -5663 in supR3HardNtChildPurify! (enmWhat=5)
3568.1f6c: supHardenedWinVerifyProcess failed with Unknown Status -5663 (0xffffe9e1): The process already has KERNEL32.DLL loaded.
3568.1f6c: supR3HardNtEnableThreadCreation: