Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?xml version="1.0" encoding="UTF-8" standalone="no" ?>
- - <avrf:logfile xmlns:avrf="Application Verifier">
- - <avrf:logSession TimeStarted="2010-01-19 : 22:58:47" PID="7132" Version="2">
- - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2204" Severity="Information">
- <avrf:message>Called the GetVersion API.</avrf:message>
- <avrf:formatmessage>Returned 8.3 build number: 8100.</avrf:formatmessage>
- <avrf:parameter1>0 - N/A</avrf:parameter1>
- <avrf:parameter2>0 - N/A</avrf:parameter2>
- <avrf:parameter3>0 - N/A</avrf:parameter3>
- <avrf:parameter4>0 - N/A</avrf:parameter4>
- </avrf:logEntry>
- - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2202" Severity="Information">
- <avrf:message>Called the GetVersionEx API.</avrf:message>
- <avrf:formatmessage>Returned 8.3 build number: 8100, service pack: 0.0, suite mask: 0x00000000, product type: (null).</avrf:formatmessage>
- <avrf:parameter1>0 - N/A</avrf:parameter1>
- <avrf:parameter2>0 - N/A</avrf:parameter2>
- <avrf:parameter3>0 - N/A</avrf:parameter3>
- <avrf:parameter4>0 - N/A</avrf:parameter4>
- </avrf:logEntry>
- - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2200" Severity="Information">
- <avrf:message>Called the GetVersionEx API.</avrf:message>
- <avrf:formatmessage>Returned 8.3 build number: 8100.</avrf:formatmessage>
- <avrf:parameter1>0 - N/A</avrf:parameter1>
- <avrf:parameter2>0 - N/A</avrf:parameter2>
- <avrf:parameter3>0 - N/A</avrf:parameter3>
- <avrf:parameter4>0 - N/A</avrf:parameter4>
- </avrf:logEntry>
- - <avrf:logEntry Time="2010-01-19 : 23:01:28" LayerName="Leak" StopCode="0x900" Severity="Error">
- <avrf:message>A heap allocation was leaked.</avrf:message>
- <avrf:parameter1>fa2efb0 - Address of the leaked allocation. Run !heap -p -a <address> to get additional information about the allocation.</avrf:parameter1>
- <avrf:parameter2>55bd414 - Address to the allocation stack trace. Run dps <address> to view the allocation stack.</avrf:parameter2>
- <avrf:parameter3>14806fe2 - Address of the owner dll name. Run du <address> to read the dll name.</avrf:parameter3>
- <avrf:parameter4>12c50000 - Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.</avrf:parameter4>
- - <avrf:stackTrace>
- <avrf:trace>vfbasics!AVrfpCheckDllLeaks+b8 (d:\avrf\source\base\avrf\vrfcommon\leak.c @ 636)</avrf:trace>
- <avrf:trace>ntdll!RtlDeleteElementGenericTableAvl+4b ( @ 0)</avrf:trace>
- <avrf:trace>vfbasics!AVrfLeakDllUnload+58 (d:\avrf\source\base\avrf\vrfcommon\leak.c @ 1477)</avrf:trace>
- <avrf:trace>vfbasics!AVrfpDllUnloadCallback+149 (d:\avrf\source\base\avrf\vrfcommon\dlls.c @ 567)</avrf:trace>
- <avrf:trace>ntdll!RtlApplicationVerifierStop+1a6 ( @ 0)</avrf:trace>
- <avrf:trace>ntdll!RtlUlonglongByteSwap+20e5 ( @ 0)</avrf:trace>
- <avrf:trace>ntdll!LdrUnloadDll+4a ( @ 0)</avrf:trace>
- <avrf:trace>vfbasics!AVrfpLdrUnloadDll+5d (d:\avrf\source\base\avrf\vrfcommon\dlls.c @ 1338)</avrf:trace>
- <avrf:trace>KERNELBASE!FreeLibrary+15 ( @ 0)</avrf:trace>
- <avrf:trace>vfprint!VfFreeLibrary+2e (d:\avrf\source\base\avrf\avrf30\providers\print\vfprint\vfhooks.cpp @ 63)</avrf:trace>
- </avrf:stackTrace>
- </avrf:logEntry>
- </avrf:logSession>
- </avrf:logfile>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement