I have found that disabling the network and audio adapters do not help. Also, disabling the Symantic Endpoint Protection does not help either. I have done research I just cannot figure out what the problem is; I cannot get a VM to start up at all.
Result Code:
E_FAIL (0x80004005)
Component:
MachineWrap
Interface:
IMachine {f30138d4-e5ea-4b3a-8858-a059de4c93fd}
Log file:
Code: Select all
1074.a28: Log file opened: 5.0.2r102096 g_hStartupLog=00000000000000d4 g_uNtVerCombined=0x611db110
1074.a28: \SystemRoot\System32\ntdll.dll:
1074.a28: CreationTime: 2015-08-26T15:06:54.189109700Z
1074.a28: LastWriteTime: 2015-07-15T18:12:09.914419700Z
1074.a28: ChangeTime: 2015-08-26T15:13:48.434020900Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x1a67c0
1074.a28: NT Headers: 0xe0
1074.a28: Timestamp: 0x55a6a196
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x55a6a196
1074.a28: Image Version: 6.1
1074.a28: SizeOfImage: 0x1a9000 (1740800)
1074.a28: Resource Dir: 0x14d000 LB 0x5a028
1074.a28: ProductName: Microsoft® Windows® Operating System
1074.a28: ProductVersion: 6.1.7601.18933
1074.a28: FileVersion: 6.1.7601.18933 (win7sp1_gdr.150715-0600)
1074.a28: FileDescription: NT Layer DLL
1074.a28: \SystemRoot\System32\kernel32.dll:
1074.a28: CreationTime: 2015-08-26T15:06:54.079909700Z
1074.a28: LastWriteTime: 2015-07-15T18:10:48.771000000Z
1074.a28: ChangeTime: 2015-08-26T15:13:48.590021200Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x11c000
1074.a28: NT Headers: 0xe8
1074.a28: Timestamp: 0x55a6a16e
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x55a6a16e
1074.a28: Image Version: 6.1
1074.a28: SizeOfImage: 0x11f000 (1175552)
1074.a28: Resource Dir: 0x116000 LB 0x528
1074.a28: ProductName: Microsoft® Windows® Operating System
1074.a28: ProductVersion: 6.1.7601.18933
1074.a28: FileVersion: 6.1.7601.18933 (win7sp1_gdr.150715-0600)
1074.a28: FileDescription: Windows NT BASE API Client DLL
1074.a28: \SystemRoot\System32\KernelBase.dll:
1074.a28: CreationTime: 2015-08-26T15:06:55.468309700Z
1074.a28: LastWriteTime: 2015-07-15T18:10:48.771000000Z
1074.a28: ChangeTime: 2015-08-26T15:13:48.590021200Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x67c00
1074.a28: NT Headers: 0xe8
1074.a28: Timestamp: 0x55a6a16f
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x55a6a16f
1074.a28: Image Version: 6.1
1074.a28: SizeOfImage: 0x6c000 (442368)
1074.a28: Resource Dir: 0x6a000 LB 0x530
1074.a28: ProductName: Microsoft® Windows® Operating System
1074.a28: ProductVersion: 6.1.7601.18933
1074.a28: FileVersion: 6.1.7601.18933 (win7sp1_gdr.150715-0600)
1074.a28: FileDescription: Windows NT BASE API Client DLL
1074.a28: \SystemRoot\System32\apisetschema.dll:
1074.a28: CreationTime: 2015-08-26T15:06:57.168709700Z
1074.a28: LastWriteTime: 2015-07-15T18:00:47.180000000Z
1074.a28: ChangeTime: 2015-08-26T15:13:48.418420900Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x1a00
1074.a28: NT Headers: 0xc0
1074.a28: Timestamp: 0x55a6a016
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x55a6a016
1074.a28: Image Version: 6.1
1074.a28: SizeOfImage: 0x50000 (327680)
1074.a28: Resource Dir: 0x30000 LB 0x3f8
1074.a28: ProductName: Microsoft® Windows® Operating System
1074.a28: ProductVersion: 6.1.7601.18933
1074.a28: FileVersion: 6.1.7601.18933 (win7sp1_gdr.150715-0600)
1074.a28: FileDescription: ApiSet Schema DLL
1074.a28: NtOpenDirectoryObject failed on \Driver: 0xc0000022
1074.a28: supR3HardenedWinFindAdversaries: 0x3
1074.a28: \SystemRoot\System32\drivers\SysPlant.sys:
1074.a28: CreationTime: 2015-08-26T13:44:34.059659400Z
1074.a28: LastWriteTime: 2015-08-26T13:44:34.059659400Z
1074.a28: ChangeTime: 2015-08-26T13:44:34.059659400Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x26ef0
1074.a28: NT Headers: 0xf8
1074.a28: Timestamp: 0x51a0ec2d
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x51a0ec2d
1074.a28: Image Version: 5.0
1074.a28: SizeOfImage: 0x2f000 (192512)
1074.a28: Resource Dir: 0x2d000 LB 0x490
1074.a28: ProductName: Symantec CMC Firewall
1074.a28: ProductVersion: 12.1.3001.165
1074.a28: FileVersion: 12.1.3001.165
1074.a28: FileDescription: Symantec CMC Firewall SysPlant
1074.a28: \SystemRoot\System32\sysfer.dll:
1074.a28: CreationTime: 2015-08-26T13:44:34.044059300Z
1074.a28: LastWriteTime: 2015-08-26T13:44:34.044059300Z
1074.a28: ChangeTime: 2015-08-26T13:44:34.044059300Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x70190
1074.a28: NT Headers: 0xe8
1074.a28: Timestamp: 0x51a0ecb5
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x51a0ecb5
1074.a28: Image Version: 0.0
1074.a28: SizeOfImage: 0x87000 (552960)
1074.a28: Resource Dir: 0x85000 LB 0x628
1074.a28: ProductName: Symantec CMC Firewall
1074.a28: ProductVersion: 12.1.3001.165
1074.a28: FileVersion: 12.1.3001.165
1074.a28: FileDescription: Symantec CMC Firewall sysfer
1074.a28: \SystemRoot\System32\sysferThunk.dll:
1074.a28: CreationTime: 2015-08-26T13:44:34.044059300Z
1074.a28: LastWriteTime: 2015-08-26T13:44:34.059659400Z
1074.a28: ChangeTime: 2015-08-26T13:44:34.059659400Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x2f90
1074.a28: NT Headers: 0xd0
1074.a28: Timestamp: 0x51a0ecb6
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x51a0ecb6
1074.a28: Image Version: 0.0
1074.a28: SizeOfImage: 0x8000 (32768)
1074.a28: Resource Dir: 0x6000 LB 0x640
1074.a28: ProductName: Symantec CMC Firewall
1074.a28: ProductVersion: 12.1.3001.165
1074.a28: FileVersion: 12.1.3001.165
1074.a28: FileDescription: Symantec CMC Firewall SysferThunk
1074.a28: \SystemRoot\System32\drivers\symevent64x86.sys:
1074.a28: CreationTime: 2015-08-26T13:44:54.620495500Z
1074.a28: LastWriteTime: 2015-08-26T13:44:54.620495500Z
1074.a28: ChangeTime: 2015-08-26T13:44:54.620495500Z
1074.a28: FileAttributes: 0x20
1074.a28: Size: 0x2b4a0
1074.a28: NT Headers: 0xe8
1074.a28: Timestamp: 0x50346f1e
1074.a28: Machine: 0x8664 - amd64
1074.a28: Timestamp: 0x50346f1e
1074.a28: Image Version: 6.0
1074.a28: SizeOfImage: 0x38000 (229376)
1074.a28: Resource Dir: 0x36000 LB 0x3c8
1074.a28: ProductName: SYMEVENT
1074.a28: ProductVersion: 12.9.3.1
1074.a28: FileVersion: 12.9.3.1
1074.a28: FileDescription: Symantec Event Library
1074.a28: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
1074.a28: Calling main()
1074.a28: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
1074.a28: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
1074.a28: SUPR3HardenedMain: Respawn #1
1074.a28: System32: \Device\HarddiskVolume1\Windows\System32
1074.a28: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
1074.a28: KnownDllPath: C:\Windows\system32
1074.a28: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
1074.a28: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe)
1074.a28: supR3HardNtEnableThreadCreation:
1074.a28: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000076ecb630 pvNtTerminateThread=0000000076eedee0
1074.a28: supR3HardenedWinDoReSpawn(1): New child 1b04.868 [kernel32].
1074.a28: supR3HardNtChildGatherData: PebBaseAddress=000007fffffdd000 cbPeb=0x380
1074.a28: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000076ea0000 uNtDllChildAddr=0000000076ea0000
1074.a28: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000076ecb630
1074.a28: supR3HardenedWinSetupChildInit: Start child.
1074.a28: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
1074.a28: supR3HardNtChildPurify: Startup delay kludge #1/0: 516 ms, 64 sleeps
1074.a28: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
1074.a28: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
1074.a28: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
1074.a28: *0000000000030000-0000000000027fff 0x0040/0x0040 0x0020000 !!
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000030000 (LB 0x8000, 0000000000030000 LB 0x8000)
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000030000/0000000000030000 LB 0/0x8000]
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000030000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
1074.a28: 0000000000038000-000000000002ffff 0x0001/0x0000 0x0000000
1074.a28: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000
1074.a28: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000
1074.a28: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000
1074.a28: 0000000000051000-0000000000041fff 0x0001/0x0000 0x0000000
1074.a28: *0000000000060000-000000000005efff 0x0040/0x0040 0x0020000 !!
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000)
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000]
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x110000 s=0x10000 ap=0x0 rp=0x00000000000001
1074.a28: 0000000000061000-fffffffffff51fff 0x0001/0x0000 0x0000000
1074.a28: *0000000000170000-0000000000073fff 0x0000/0x0004 0x0020000
1074.a28: 000000000026c000-0000000000268fff 0x0104/0x0004 0x0020000
1074.a28: 000000000026f000-000000000026dfff 0x0004/0x0004 0x0020000
1074.a28: 0000000000270000-ffffffff8963ffff 0x0001/0x0000 0x0000000
1074.a28: *0000000076ea0000-0000000076ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076ea1000-0000000076f9efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076f9f000-0000000076fcdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fce000-0000000076fd5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fd6000-0000000076fd6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fd7000-0000000076fd9fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fda000-0000000077048fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000077049000-000000006f0b1fff 0x0001/0x0000 0x0000000
1074.a28: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
1074.a28: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
1074.a28: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
1074.a28: 000000007fff0000-ffffffffc001ffff 0x0001/0x0000 0x0000000
1074.a28: *000000013ffc0000-000000013ffc0fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 000000013ffc1000-0000000140046fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140047000-0000000140047fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140048000-0000000140091fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140092000-0000000140092fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140093000-0000000140093fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140094000-0000000140095fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140096000-0000000140096fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140097000-0000000140097fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140098000-000000014009bfff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 000000014009c000-00000001400e5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 00000001400e6000-00000001400dbfff 0x0001/0x0000 0x0000000
1074.a28: *00000001400f0000-00000001400eefff 0x0040/0x0040 0x0020000 !!
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 00000001400f0000 (LB 0x1000, 00000001400f0000 LB 0x1000)
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [00000001400f0000/00000001400f0000 LB 0/0x1000]
1074.a28: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/00000001400f0000 LB 0x7fdbf0d0000 s=0x10000 ap=0x0 rp=0x00000000000001
1074.a28: 00000001400f1000-fffff80381021fff 0x0001/0x0000 0x0000000
1074.a28: *000007feff1c0000-000007feff1c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
1074.a28: 000007feff1c1000-000007fdfe3d1fff 0x0001/0x0000 0x0000000
1074.a28: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
1074.a28: 000007fffffd3000-000007fffffc8fff 0x0001/0x0000 0x0000000
1074.a28: *000007fffffdd000-000007fffffdbfff 0x0004/0x0004 0x0020000
1074.a28: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
1074.a28: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
1074.a28: apisetschema.dll: timestamp 0x55a6a016 (rc=VINF_SUCCESS)
1074.a28: VirtualBox.exe: timestamp 0x55ccc4d5 (rc=VINF_SUCCESS)
1074.a28: '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
1074.a28: VirtualBox.exe: Differences in section #0 (headers) between file and memory:
1074.a28: 000000013ffc016a / 0x000016a: 00 != 13
1074.a28: 000000013ffc016c / 0x000016c: 00 != cc
1074.a28: 000000013ffc016d / 0x000016d: 00 != 01
1074.a28: 000000013ffc01c0 / 0x00001c0: 00 != cc
1074.a28: 000000013ffc01c1 / 0x00001c1: 00 != 01
1074.a28: 000000013ffc01c2 / 0x00001c2: 00 != 13
1074.a28: 000000013ffc01c4 / 0x00001c4: 00 != 20
1074.a28: Restored 0x400 bytes of original file content at 000000013ffc0000
1074.a28: '\Device\HarddiskVolume1\Windows\System32\apisetschema.dll' has no imports
1074.a28: '\Device\HarddiskVolume1\Windows\System32\ntdll.dll' has no imports
1074.a28: supR3HardNtChildPurify: cFixes=4 g_fSupAdversaries=0x3 cPatchCount=0
1074.a28: supR3HardNtChildPurify: Startup delay kludge #1/1: 514 ms, 64 sleeps
1074.a28: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
1074.a28: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
1074.a28: *0000000000010000-fffffffffffeffff 0x0004/0x0004 0x0020000
1074.a28: 0000000000030000-000000000001ffff 0x0001/0x0000 0x0000000
1074.a28: *0000000000040000-000000000003bfff 0x0002/0x0002 0x0040000
1074.a28: 0000000000044000-0000000000037fff 0x0001/0x0000 0x0000000
1074.a28: *0000000000050000-000000000004efff 0x0004/0x0004 0x0020000
1074.a28: 0000000000051000-fffffffffff31fff 0x0001/0x0000 0x0000000
1074.a28: *0000000000170000-0000000000073fff 0x0000/0x0004 0x0020000
1074.a28: 000000000026c000-0000000000268fff 0x0104/0x0004 0x0020000
1074.a28: 000000000026f000-000000000026dfff 0x0004/0x0004 0x0020000
1074.a28: 0000000000270000-ffffffff8963ffff 0x0001/0x0000 0x0000000
1074.a28: *0000000076ea0000-0000000076ea0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076ea1000-0000000076f9efff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076f9f000-0000000076fcdfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fce000-0000000076fd5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fd6000-0000000076fd6fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fd7000-0000000076fd7fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fd8000-0000000076fd9fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000076fda000-0000000077048fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\ntdll.dll
1074.a28: 0000000077049000-000000006f0b1fff 0x0001/0x0000 0x0000000
1074.a28: *000000007efe0000-000000007dfdffff 0x0000/0x0002 0x0020000
1074.a28: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
1074.a28: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
1074.a28: 000000007fff0000-ffffffffc001ffff 0x0001/0x0000 0x0000000
1074.a28: *000000013ffc0000-000000013ffc0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 000000013ffc1000-0000000140046fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140047000-0000000140047fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140048000-0000000140091fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 0000000140092000-000000014009bfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 000000014009c000-00000001400e5fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Program Files\Oracle\VirtualBox\VirtualBox.exe
1074.a28: 00000001400e6000-fffff8038100bfff 0x0001/0x0000 0x0000000
1074.a28: *000007feff1c0000-000007feff1c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume1\Windows\System32\apisetschema.dll
1074.a28: 000007feff1c1000-000007fdfe3d1fff 0x0001/0x0000 0x0000000
1074.a28: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
1074.a28: 000007fffffd3000-000007fffffc8fff 0x0001/0x0000 0x0000000
1074.a28: *000007fffffdd000-000007fffffdbfff 0x0004/0x0004 0x0020000
1074.a28: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
1074.a28: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
1074.a28: supR3HardNtChildPurify: Done after 1066 ms and 4 fixes (loop #1).
1074.a28: supR3HardNtEnableThreadCreation:
1b04.868: Log file opened: 5.0.2r102096 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db110
1b04.868: supR3HardenedVmProcessInit: uNtDllAddr=0000000076ea0000
1b04.868: ntdll.dll: timestamp 0x55a6a196 (rc=VINF_SUCCESS)
1b04.868: New simple heap: #1 0000000000270000 LB 0x400000 (for 1740800 allocation)
1b04.868: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume1\Program Files\Oracle\VirtualBox'
1b04.868: System32: \Device\HarddiskVolume1\Windows\System32
1b04.868: WinSxS: \Device\HarddiskVolume1\Windows\winsxs
1b04.868: KnownDllPath: C:\Windows\system32
1b04.868: supR3HardenedVmProcessInit: Opening vboxdrv stub...
1b04.868: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk...
1b04.868: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk...
1b04.868: Registered Dll notification callback with NTDLL.
1b04.868: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\kernel32.dll)
1b04.868: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\kernel32.dll
1b04.868: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling]
1b04.868: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
1b04.868: supR3HardenedDllNotificationCallback: load 0000000076c80000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0]
1b04.868: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume1\Windows\System32\kernel32.dll [lacks WinVerifyTrust]
1b04.868: supR3HardenedDllNotificationCallback: load 000007fefcca0000 LB 0x0006c000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0]
1b04.868: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume1\Windows\System32\KernelBase.dll)
1b04.868: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume1\Windows\System32\KernelBase.dll
1b04.868: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000076c80000 'C:\Windows\system32\kernel32.dll'
1074.a28: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 22 ms, CloseEvents);