Skulltrail192 / One-Core-API-Binaries

http://shorthornproject.com
574 stars 47 forks source link

VirtualBox 5.2.44 Crashes on Startup with OCAPI 3.0.5 #263

Open sambow23 opened 4 months ago

sambow23 commented 4 months ago

Installs perfectly fine, including drivers, but crashes upon startup, even when ran in compatibility mode.

Config: Dell Latitude E6400 | Core 2 Duo P8700 | NVIDIA NVS 160M GPU | 8GB RAM | Windows XP SP3 | SATA SSD Here is a trace/dump from the crash

Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.

Application exception occurred:
        App: C:\Program Files\Oracle\VirtualBox\VirtualBox.exe (pid=1864)
        When: 2/22/2024 @ 09:19:05.906
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: WINXPIE-31572
        User Name: Admin
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 6 Model 7 Stepping 10
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 3
        Current Type: Multiprocessor Free
        Registered Organization: Unknown Organization
        Registered Owner: Unknown User

*----> Task List <----*
   0 System Process
   4 System
 976 smss.exe
1048 csrss.exe
1076 winlogon.exe
1124 services.exe
1136 lsass.exe
1296 svchost.exe
1380 svchost.exe
1420 svchost.exe
1464 svchost.exe
1600 svchost.exe
1692 S24EvMon.exe
1744 svchost.exe
1768 svchost.exe
 292 spoolsv.exe
 368 stacsv.exe
 624 Explorer.EXE
 636 SCardSvr.exe
 208 taskswitch.exe
 320 RUNDLL32.EXE
 352 sttray.exe
 440 AESTFltr.exe
 400 ZCfgSvc.exe
 392 iFrmewrk.exe
 456 ctfmon.exe
 524 ShareX.exe
1740 thorium.exe
1956 svchost.exe
 468 EvtEng.exe
 796 nvsvc32.exe
 772 RegSrvc.exe
2208 unsecapp.exe
2264 wmiprvse.exe
2432 svchost.exe
2468 svchost.exe
2916 unsecapp.exe
 940 thorium.exe
 960 thorium.exe
1028 thorium.exe
 912 thorium.exe
 900 thorium.exe
2840 alg.exe
3328 thorium.exe
4012 git-bash.exe
2256 mintty.exe
3488 thorium.exe
2796 thorium.exe
2544 ProcessHacker.exe
2000 thorium.exe
2828 thorium.exe
 360 thorium.exe
3832 mmc.exe
1224 thorium.exe
2984 thorium.exe
1100 thorium.exe
1364 thorium.exe
 496 thorium.exe
1864 VirtualBox.exe
2728 dwwin.exe
2012 drwtsn32.exe

*----> Module List <----*
(0000000000350000 - 000000000035b000: C:\WINDOWS\system32\Secur32.dll
(0000000000400000 - 00000000004f3000: C:\Program Files\Oracle\VirtualBox\VirtualBox.exe
(0000000000a80000 - 0000000000b1d000: C:\WINDOWS\system32\USP10.dll
(0000000004fb0000 - 0000000004fb9000: C:\WINDOWS\system32\psapi.dll
(0000000020030000 - 0000000020043000: C:\WINDOWS\system32\RPCRT4.dll
(0000000020050000 - 0000000020061000: C:\WINDOWS\system32\SHLWAPI.dll
(00000000220d0000 - 0000000022134000: C:\WINDOWS\system32\GDI32.dll
(0000000023000000 - 0000000023074000: C:\WINDOWS\AppPatch\AcLayers.DLL
(0000000024bc0000 - 0000000024bc8000: C:\WINDOWS\system32\WINSTA.dll
(0000000027040000 - 0000000027106000: C:\WINDOWS\system32\propsys.dll
(0000000027920000 - 0000000027928000: C:\WINDOWS\system32\userenv.dll
(0000000027a20000 - 0000000027a5e000: C:\WINDOWS\system32\USER32.dll
(000000002a610000 - 000000002a61e000: C:\WINDOWS\system32\ole32.dll
(000000002aac0000 - 000000002aaca000: C:\WINDOWS\system32\UxTheme.dll
(000000002aec0000 - 000000002aecf000: C:\WINDOWS\system32\netapi32.dll
(000000002b630000 - 000000002c066000: C:\WINDOWS\system32\SHELL32.dll
(000000002c520000 - 000000002c53e000: C:\WINDOWS\system32\advapi32.dll
(000000002d850000 - 000000002d8b2000: C:\WINDOWS\system32\kernelbase.dll
(000000002dec0000 - 000000002df10000: C:\WINDOWS\system32\ntext.dll
(000000004d500000 - 000000004d53d000: C:\WINDOWS\system32\gdibase.dll
(0000000052180000 - 000000005218a000: C:\WINDOWS\system32\version.dll
(000000005ad70000 - 000000005adb6000: C:\WINDOWS\system32\uxthemebase.dll
(000000005b860000 - 000000005b8b6000: C:\WINDOWS\system32\netapibase.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(00000000629c0000 - 00000000629c9000: C:\WINDOWS\system32\LPK.DLL
(0000000063050000 - 0000000063075000: C:\WINDOWS\system32\winstanew.dll
(0000000069e00000 - 0000000069e86000: C:\WINDOWS\system32\userbase.dll
(0000000069f90000 - 0000000069f96000: C:\WINDOWS\system32\browseui.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000070860000 - 000000007090a000: C:\WINDOWS\system32\msvcrt.dll
(0000000071a00000 - 0000000071aec000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.3790.5190_x-ww_319264be\comctl32.dll
(0000000072040000 - 00000000720d3000: C:\WINDOWS\system32\rpcrtbase.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000075040000 - 00000000750b7000: C:\WINDOWS\system32\shlwapibase.dll
(0000000076040000 - 0000000076051000: C:\WINDOWS\system32\securbase.dll
(0000000076080000 - 00000000760e5000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\winstabase.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000769c0000 - 0000000076a74000: C:\WINDOWS\system32\userenvbase.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000077120000 - 00000000771ae000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000774e0000 - 000000007761f000: C:\WINDOWS\system32\olebase.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077dd0000 - 000000007808b000: C:\WINDOWS\system32\advapibase.dll
(000000007c800000 - 000000007c8ee000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b1000: C:\WINDOWS\System32\ntdll.dll
(000000007c9c0000 - 000000007d5e1000: C:\WINDOWS\system32\shellbase.dll
(000000007d850000 - 000000007d94d000: C:\WINDOWS\system32\browsebase.dll

*----> State Dump for Thread Id 0xf4c <----*

eax=00000001 ebx=00000000 ecx=004827b8 edx=00000000 esi=7c96bc94 edi=004a33e8
eip=00418084 esp=0013eb68 ebp=0013f7a8 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Oracle\VirtualBox\VirtualBox.exe - 
function: VirtualBox
        00418069 83c40c          add     esp,0Ch
        0041806c 85c0            test    eax,eax
        0041806e 7514            jne     VirtualBox+0x18084 (00418084)
        00418070 50              push    eax
        00418071 8d45e4          lea     eax,[ebp-1Ch]
        00418074 50              push    eax
        00418075 be28344a00      mov     esi,offset VirtualBox!g_abRTZero16K+0x75e58 (004a3428)
        0041807a e861f9ffff      call    VirtualBox+0x179e0 (004179e0)
        0041807f 83c408          add     esp,8
        00418082 eb0f            jmp     VirtualBox+0x18093 (00418093)
FAULT ->00418084 8a0d12000000    mov     cl,byte ptr ds:[12h]       ds:0023:00000012=??
        0041808a fec1            inc     cl
        0041808c 880d12000000    mov     byte ptr ds:[12h],cl
        00418092 cc              int     3
        00418093 8b45f4          mov     eax,dword ptr [ebp-0Ch]
        00418096 8b5df8          mov     ebx,dword ptr [ebp-8]
        00418099 40              inc     eax
        0041809a 83c310          add     ebx,10h
        0041809d 8945f4          mov     dword ptr [ebp-0Ch],eax
        004180a0 895df8          mov     dword ptr [ebp-8],ebx
        004180a3 3b07            cmp     eax,dword ptr [edi]

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\ntdll.dll - 
ChildEBP RetAddr  Args to Child              
WARNING: Stack unwind information not available. Following frames may be wrong.
0013f7a8 0040a145 00000000 7c9162dd 00251fc0 VirtualBox+0x18084
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll - 
0013ffc0 7c838276 00000000 7c9162dd 7ffdf000 VirtualBox+0xa145
0013fff0 00000000 0040a120 00000000 78746341 kernel32!BaseFormatTimeOut+0x51

*----> Raw Stack Dump <----*
000000000013eb68  00 00 00 00 01 00 00 00 - 00 f0 fd 7f 68 06 b6 76  ............h..v
000000000013eb78  68 06 b6 76 9c 00 14 00 - 02 00 00 00 8c 00 14 00  h..v............
000000000013eb88  00 00 00 00 00 00 00 00 - 0b 13 92 7c b4 eb 13 00  ...........|....
000000000013eb98  9c 00 14 00 00 00 00 00 - 00 00 00 00 e0 eb 13 00  ................
000000000013eba8  50 06 14 00 88 2f 15 00 - 88 2f 15 00 38 06 14 00  P..../.../..8...
000000000013ebb8  0c ec 13 00 d9 1a 92 7c - e0 eb 13 00 68 06 b6 76  .......|....h..v
000000000013ebc8  2e 6d 81 7c 4a 6d 81 7c - 30 ee 13 00 7a 06 b6 76  .m.|Jm.|0...z..v
000000000013ebd8  3c f0 13 00 a5 72 81 7c - 09 04 00 00 01 00 00 00  <....r.|........
000000000013ebe8  68 06 b6 76 f2 6e 00 00 - 3c f0 13 00 82 35 b4 76  h..v.n..<....5.v
000000000013ebf8  94 00 00 00 00 00 00 00 - b4 f9 13 00 80 00 00 00  ................
000000000013ec08  b0 f4 13 00 68 06 b6 76 - 88 72 81 7c a9 35 b4 76  ....h..v.r.|.5.v
000000000013ec18  01 00 00 00 68 06 b6 76 - b0 f4 13 00 b4 f9 13 00  ....h..v........
000000000013ec28  b8 f9 13 00 64 ec 13 00 - 5c ec 13 00 34 bc 90 7c  ....d...\...4..|
000000000013ec38  c1 29 b4 76 94 00 00 00 - 64 ec 13 00 02 00 00 00  .).v....d.......
000000000013ec48  74 ec 13 00 18 02 00 00 - 60 ec 13 00 00 00 00 00  t.......`.......
000000000013ec58  2e 6d 81 7c ef 29 b4 76 - 22 00 00 00 0c 00 0e 00  .m.|.).v".......
000000000013ec68  b4 f9 13 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000013ec78  01 00 00 00 16 00 00 00 - 77 00 64 00 6d 00 61 00  ........w.d.m.a.
000000000013ec88  75 00 64 00 2e 00 64 00 - 72 00 76 00 00 00 76 00  u.d...d.r.v...v.
000000000013ec98  00 00 00 00 1b 01 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xc48 <----*

eax=00d1ff7c ebx=00d1fef0 ecx=7c81562d edx=00000000 esi=00000000 edi=7ffdf000
eip=7c926f28 esp=00d1fea8 ebp=00d1ff44 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c926f19 ebf7            jmp     ntdll!KiUserCallbackDispatcher+0x1a (7c926f12)
        7c926f1b 90              nop
        ntdll!KiFastSystemCall:
        7c926f1c 8bd4            mov     edx,esp
        7c926f1e 0f34            sysenter
        ntdll!KiIntSystemCall:
        7c926f20 8d542408        lea     edx,[esp+8]
        7c926f24 cd2e            int     2Eh
        7c926f26 c3              ret
        7c926f27 90              nop
        ntdll!KiFastSystemCallRet:
        7c926f28 c3              ret
        7c926f29 8d4900          lea     ecx,[ecx]
        ntdll!KiUserExceptionDispatcher:
        7c926f2c 8b4c2404        mov     ecx,dword ptr [esp+4]
        7c926f30 8b1c24          mov     ebx,dword ptr [esp]
        7c926f33 51              push    ecx
        7c926f34 53              push    ebx
        7c926f35 e8e4270200      call    ntdll!RtlUnhandledExceptionFilter+0x11 (7c94971e)
        7c926f3a 0ac0            or      al,al
        7c926f3c 740c            je      ntdll!KiUserExceptionDispatcher+0x1e (7c926f4a)
        7c926f3e 5b              pop     ebx

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\advapibase.dll - 
ChildEBP RetAddr  Args to Child              
WARNING: Stack unwind information not available. Following frames may be wrong.
00d1ff44 77df8631 00000002 00d1ff6c 00000000 ntdll!KiFastSystemCallRet
00d1ffb4 7c817320 00000000 0013f5d4 00000000 advapibase!WmiFreeBuffer+0x24e
00d1ffec 00000000 77df848a 00000000 00000000 kernel32!lstrcmpiW+0x98

*----> Raw Stack Dump <----*
0000000000d1fea8  04 c2 90 7c ea 97 83 7c - 02 00 00 00 f0 fe d1 00  ...|...|........
0000000000d1feb8  01 00 00 00 01 00 00 00 - dc fe d1 00 e8 3e b2 00  .............>..
0000000000d1fec8  60 66 e4 77 00 10 00 00 - 00 00 00 00 03 01 00 00  `f.w............
0000000000d1fed8  dc fe d1 00 00 a2 2f 4d - ff ff ff ff 02 00 00 00  ....../M........
0000000000d1fee8  00 f0 fd 7f 00 d0 fd 7f - 64 00 00 00 6c 00 00 00  ........d...l...
0000000000d1fef8  60 00 00 00 44 81 22 00 - e0 2e b2 00 28 00 00 00  `...D.".....(...
0000000000d1ff08  e0 2e b2 00 00 10 00 00 - f0 fe d1 00 22 89 df 77  ............"..w
0000000000d1ff18  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000d1ff28  10 00 00 00 c4 fe d1 00 - 06 00 00 00 dc ff d1 00  ................
0000000000d1ff38  2c 8c 86 7c 78 37 80 7c - 00 00 00 00 b4 ff d1 00  ,..|x7.|........
0000000000d1ff48  31 86 df 77 02 00 00 00 - 6c ff d1 00 00 00 00 00  1..w....l.......
0000000000d1ff58  e0 93 04 00 01 00 00 00 - d4 f5 13 00 00 00 00 00  ................
0000000000d1ff68  00 00 00 00 64 00 00 00 - 6c 00 00 00 00 10 00 00  ....d...l.......
0000000000d1ff78  e8 3e b2 00 00 00 00 00 - 00 10 00 00 e0 2e b2 00  .>..............
0000000000d1ff88  e0 66 e4 77 28 00 00 00 - 00 67 e4 77 00 10 00 00  .f.w(....g.w....
0000000000d1ff98  00 00 00 00 e0 66 e4 77 - e8 3e b2 00 00 67 e4 77  .....f.w.>...g.w
0000000000d1ffa8  e5 03 00 00 00 10 00 00 - e0 2e b2 00 ec ff d1 00  ................
0000000000d1ffb8  20 73 81 7c 00 00 00 00 - d4 f5 13 00 00 00 00 00   s.|............
0000000000d1ffc8  00 00 00 00 00 00 00 00 - 00 d0 fd 7f c0 ff d1 00  ................
0000000000d1ffd8  07 00 00 00 ff ff ff ff - 2c 8c 86 7c 10 37 80 7c  ........,..|.7.|
Skulltrail192 commented 4 months ago

And without OCA, it's run?

nixxoq commented 4 months ago

And without OCA, it's run?

Yes, because it's the last version of virtualbox which running officially on Windows XP