Advertisement
Guest User

Untitled

a guest
Apr 6th, 2012
183
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.36 KB | None | 0 0
  1. <?xml version="1.0" encoding="UTF-8" standalone="no" ?>
  2. - <avrf:logfile xmlns:avrf="Application Verifier">
  3. - <avrf:logSession TimeStarted="2010-01-19 : 22:58:47" PID="7132" Version="2">
  4. - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2204" Severity="Information">
  5. <avrf:message>Called the GetVersion API.</avrf:message>
  6. <avrf:formatmessage>Returned 8.3 build number: 8100.</avrf:formatmessage>
  7. <avrf:parameter1>0 - N/A</avrf:parameter1>
  8. <avrf:parameter2>0 - N/A</avrf:parameter2>
  9. <avrf:parameter3>0 - N/A</avrf:parameter3>
  10. <avrf:parameter4>0 - N/A</avrf:parameter4>
  11. </avrf:logEntry>
  12. - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2202" Severity="Information">
  13. <avrf:message>Called the GetVersionEx API.</avrf:message>
  14. <avrf:formatmessage>Returned 8.3 build number: 8100, service pack: 0.0, suite mask: 0x00000000, product type: (null).</avrf:formatmessage>
  15. <avrf:parameter1>0 - N/A</avrf:parameter1>
  16. <avrf:parameter2>0 - N/A</avrf:parameter2>
  17. <avrf:parameter3>0 - N/A</avrf:parameter3>
  18. <avrf:parameter4>0 - N/A</avrf:parameter4>
  19. </avrf:logEntry>
  20. - <avrf:logEntry Time="2010-01-19 : 22:58:47" LayerName="HighVersionLie" StopCode="0x2200" Severity="Information">
  21. <avrf:message>Called the GetVersionEx API.</avrf:message>
  22. <avrf:formatmessage>Returned 8.3 build number: 8100.</avrf:formatmessage>
  23. <avrf:parameter1>0 - N/A</avrf:parameter1>
  24. <avrf:parameter2>0 - N/A</avrf:parameter2>
  25. <avrf:parameter3>0 - N/A</avrf:parameter3>
  26. <avrf:parameter4>0 - N/A</avrf:parameter4>
  27. </avrf:logEntry>
  28. - <avrf:logEntry Time="2010-01-19 : 23:01:28" LayerName="Leak" StopCode="0x900" Severity="Error">
  29. <avrf:message>A heap allocation was leaked.</avrf:message>
  30. <avrf:parameter1>fa2efb0 - Address of the leaked allocation. Run !heap -p -a <address> to get additional information about the allocation.</avrf:parameter1>
  31. <avrf:parameter2>55bd414 - Address to the allocation stack trace. Run dps <address> to view the allocation stack.</avrf:parameter2>
  32. <avrf:parameter3>14806fe2 - Address of the owner dll name. Run du <address> to read the dll name.</avrf:parameter3>
  33. <avrf:parameter4>12c50000 - Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.</avrf:parameter4>
  34. - <avrf:stackTrace>
  35. <avrf:trace>vfbasics!AVrfpCheckDllLeaks+b8 (d:\avrf\source\base\avrf\vrfcommon\leak.c @ 636)</avrf:trace>
  36. <avrf:trace>ntdll!RtlDeleteElementGenericTableAvl+4b ( @ 0)</avrf:trace>
  37. <avrf:trace>vfbasics!AVrfLeakDllUnload+58 (d:\avrf\source\base\avrf\vrfcommon\leak.c @ 1477)</avrf:trace>
  38. <avrf:trace>vfbasics!AVrfpDllUnloadCallback+149 (d:\avrf\source\base\avrf\vrfcommon\dlls.c @ 567)</avrf:trace>
  39. <avrf:trace>ntdll!RtlApplicationVerifierStop+1a6 ( @ 0)</avrf:trace>
  40. <avrf:trace>ntdll!RtlUlonglongByteSwap+20e5 ( @ 0)</avrf:trace>
  41. <avrf:trace>ntdll!LdrUnloadDll+4a ( @ 0)</avrf:trace>
  42. <avrf:trace>vfbasics!AVrfpLdrUnloadDll+5d (d:\avrf\source\base\avrf\vrfcommon\dlls.c @ 1338)</avrf:trace>
  43. <avrf:trace>KERNELBASE!FreeLibrary+15 ( @ 0)</avrf:trace>
  44. <avrf:trace>vfprint!VfFreeLibrary+2e (d:\avrf\source\base\avrf\avrf30\providers\print\vfprint\vfhooks.cpp @ 63)</avrf:trace>
  45. </avrf:stackTrace>
  46. </avrf:logEntry>
  47. </avrf:logSession>
  48. </avrf:logfile>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement