Discussion
AIG
US
Last activity: 5 Apr 2016 10:08 EDT
Not able to launch Pega Customer Service 7.1.4 PVS using Oracle VM VirtualBox Manager
I am trying to launch "Pega Customer Service 7.1.4" VM using Oracle VM VirtualBox Manager Version 5.0.14R105127, but it is not successful. I am seeing the following message when I try to launch. I even tried using Oracle VM VirtualBox Manager Version 5.0.15, but no luck. Please help.
The virtual machine 'Pega Customer Service 7.1.4' has terminated unexpectedly during startup with exit code 1 (0x1). More details may be available in 'C:\Softwares\Pega-7-CPM\PegaCS_714_vm_20151029\Pega Customer Service 7.1.4\Logs\VBoxHardening.log'.
Result Code: |
E_FAIL (0x80004005) |
Component: |
MachineWrap |
Interface: |
IMachine {f30138d4-e5ea-4b3a-8858-a059de4c93fd} |
-
Like (0)
-
Share this page Facebook Twitter LinkedIn Email Copying... Copied!
Pegasystems Inc.
US
Please download and carefully review the following guide to for configuring Virtual Box to run Pega Academy Virtual Machines:
Double-Check that all the configuration requirements are correctly configured and try again. If the error persists, please let us know.
Sincerely,
Henry
Self-Study Support
Pega Academy
Infosys Limited
IN
I did follow the instructions provided in the document line by line. I am still facing same issue, I have even downloaded "SSA_716_VM_20160120", but no luck. Please help me.
Pegasystems Inc.
SG
This could be due to using different versions of VirtualBox and having some "hardening" introduced causing incompatibility. I found a reference regarding this on http://is.gd/w1LD94. For quicker resolution, I suggest you re-download a new instance of the PVS and also update VirtualBox to the current version.
I can confirm that I am able to run the PegaCS_714_vm_20151029 virtual machine using VirtualBox 5.0.16 r 105871.
AIG
US
Can you provide me exact link from where you downloaded "PegaCS_714_vm_20151029" . No where I find 7.1.4.
Pegasystems Inc.
US
It is possible that the VM Image you are using is damaged. Please download the Exercise System archive file again using the "Download Exercise System" button. Then extract it using 7-ZIP. We use 7-ZIP here at Pega Academy to prepare the Downloadable Exercise System Archive Files.
Sincerely,
Henry
Self-Study Support
Pega Academy
AIG
US
Henry, I re-downloaded the VM Image several times. I did extracted using 7-ZIP. I tried to launch it. I am facing same issue. Can you please help me with this. Thanks
Pegasystems Inc.
US
could you send me the log file noted in the error message: C:\Softwares\Pega-7-CPM\PegaCS_714_vm_20151029\Pega Customer Service 7.1.4\Logs\VBoxHardening.log
also, what OS are you using on your local pc and what version of VirtualBox do you have installed?
eddie
AIG
US
Hi Eddie,
PFB the Log file content, I am sorry I don't see any option to attach logfile, so I had to copy paste entire log file contents below.
I am using Windows 7 Enterprise OS,initially I tried with VirtualBox 5.0.16 for Windows, It was giving same issue, uninstalled it and installed VirtualBox 5.0.14, just to check. But still getting same issue. Please help. Thanks.
Hi Eddie,
PFB the Log file content, I am sorry I don't see any option to attach logfile, so I had to copy paste entire log file contents below.
I am using Windows 7 Enterprise OS,initially I tried with VirtualBox 5.0.16 for Windows, It was giving same issue, uninstalled it and installed VirtualBox 5.0.14, just to check. But still getting same issue. Please help. Thanks.
3aa0.3c58: Log file opened: 5.0.14r105127 g_hStartupLog=00000000000000c4 g_uNtVerCombined=0x611db110
3aa0.3c58: \SystemRoot\System32\ntdll.dll:
3aa0.3c58: CreationTime: 2016-03-07T00:36:38.279012800Z
3aa0.3c58: LastWriteTime: 2016-01-22T06:30:15.875675000Z
3aa0.3c58: ChangeTime: 2016-03-30T16:01:32.734717400Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x1a71d8
3aa0.3c58: NT Headers: 0xe0
3aa0.3c58: Timestamp: 0x56a1cb4e
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x56a1cb4e
3aa0.3c58: Image Version: 6.1
3aa0.3c58: SizeOfImage: 0x1aa000 (1744896)
3aa0.3c58: Resource Dir: 0x14e000 LB 0x5a028
3aa0.3c58: ProductName: Microsoft® Windows® Operating System
3aa0.3c58: ProductVersion: 6.1.7601.23338
3aa0.3c58: FileVersion: 6.1.7601.23338 (win7sp1_ldr.160121-1716)
3aa0.3c58: FileDescription: NT Layer DLL
3aa0.3c58: \SystemRoot\System32\kernel32.dll:
3aa0.3c58: CreationTime: 2016-03-07T00:36:38.029668800Z
3aa0.3c58: LastWriteTime: 2016-01-22T06:28:09.279000000Z
3aa0.3c58: ChangeTime: 2016-03-30T16:01:32.734717400Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x11c400
3aa0.3c58: NT Headers: 0xe0
3aa0.3c58: Timestamp: 0x56a1cb25
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x56a1cb25
3aa0.3c58: Image Version: 6.1
3aa0.3c58: SizeOfImage: 0x11f000 (1175552)
3aa0.3c58: Resource Dir: 0x116000 LB 0x528
3aa0.3c58: ProductName: Microsoft® Windows® Operating System
3aa0.3c58: ProductVersion: 6.1.7601.23338
3aa0.3c58: FileVersion: 6.1.7601.23338 (win7sp1_ldr.160121-1716)
3aa0.3c58: FileDescription: Windows NT BASE API Client DLL
3aa0.3c58: \SystemRoot\System32\KernelBase.dll:
3aa0.3c58: CreationTime: 2016-03-07T00:36:41.754244800Z
3aa0.3c58: LastWriteTime: 2016-01-22T06:28:09.279000000Z
3aa0.3c58: ChangeTime: 2016-03-30T16:09:33.242896000Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x66800
3aa0.3c58: NT Headers: 0xe8
3aa0.3c58: Timestamp: 0x56a1cb26
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x56a1cb26
3aa0.3c58: Image Version: 6.1
3aa0.3c58: SizeOfImage: 0x6a000 (434176)
3aa0.3c58: Resource Dir: 0x68000 LB 0x530
3aa0.3c58: ProductName: Microsoft® Windows® Operating System
3aa0.3c58: ProductVersion: 6.1.7601.23338
3aa0.3c58: FileVersion: 6.1.7601.23338 (win7sp1_ldr.160121-1716)
3aa0.3c58: FileDescription: Windows NT BASE API Client DLL
3aa0.3c58: \SystemRoot\System32\apisetschema.dll:
3aa0.3c58: CreationTime: 2016-03-07T00:36:44.325604800Z
3aa0.3c58: LastWriteTime: 2016-01-22T06:17:43.259000000Z
3aa0.3c58: ChangeTime: 2016-03-30T17:55:22.005403100Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x1a00
3aa0.3c58: NT Headers: 0xc0
3aa0.3c58: Timestamp: 0x56a1c9c8
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x56a1c9c8
3aa0.3c58: Image Version: 6.1
3aa0.3c58: SizeOfImage: 0x50000 (327680)
3aa0.3c58: Resource Dir: 0x30000 LB 0x3f8
3aa0.3c58: ProductName: Microsoft® Windows® Operating System
3aa0.3c58: ProductVersion: 6.1.7601.23338
3aa0.3c58: FileVersion: 6.1.7601.23338 (win7sp1_ldr.160121-1716)
3aa0.3c58: FileDescription: ApiSet Schema DLL
3aa0.3c58: NtOpenDirectoryObject failed on \Driver: 0xc0000022
3aa0.3c58: supR3HardenedWinFindAdversaries: 0x20
3aa0.3c58: \SystemRoot\System32\drivers\mfeapfk.sys:
3aa0.3c58: CreationTime: 2015-08-28T15:53:28.966767700Z
3aa0.3c58: LastWriteTime: 2014-10-01T16:14:26.000000000Z
3aa0.3c58: ChangeTime: 2016-03-30T17:55:22.036604100Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x2c550
3aa0.3c58: NT Headers: 0xe0
3aa0.3c58: Timestamp: 0x5423454f
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x5423454f
3aa0.3c58: Image Version: 0.0
3aa0.3c58: SizeOfImage: 0x2a200 (172544)
3aa0.3c58: Resource Dir: 0x29a00 LB 0x340
3aa0.3c58: ProductName: SYSCORE
3aa0.3c58: FileVersion: SYSCORE. Proprietary information hidden
3aa0.3c58: PrivateBuild: SYSCORE. Proprietary information hidden F16
3aa0.3c58: FileDescription: Access Protection Filter Driver
3aa0.3c58: \SystemRoot\System32\drivers\mfeavfk.sys:
3aa0.3c58: CreationTime: 2015-08-28T15:53:28.857361900Z
3aa0.3c58: LastWriteTime: 2014-10-01T16:14:48.000000000Z
3aa0.3c58: ChangeTime: 2016-03-30T17:55:22.067805100Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x4c950
3aa0.3c58: NT Headers: 0xe8
3aa0.3c58: Timestamp: 0x5423455e
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x5423455e
3aa0.3c58: Image Version: 0.0
3aa0.3c58: SizeOfImage: 0x4a300 (303872)
3aa0.3c58: Resource Dir: 0x49500 LB 0x718
3aa0.3c58: ProductName: SYSCORE
3aa0.3c58: FileVersion: SYSCORE. Proprietary information hidden
3aa0.3c58: PrivateBuild: SYSCORE. Proprietary information hidden F15,F16,F19
3aa0.3c58: FileDescription: Anti-Virus File System Filter Driver
3aa0.3c58: \SystemRoot\System32\drivers\mfefirek.sys:
3aa0.3c58: CreationTime: 2016-03-29T18:43:11.590386500Z
3aa0.3c58: LastWriteTime: 2014-10-01T17:15:28.000000000Z
3aa0.3c58: ChangeTime: 2016-03-31T03:33:58.834885200Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x80818
3aa0.3c58: NT Headers: 0xe8
3aa0.3c58: Timestamp: 0x542345b1
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x542345b1
3aa0.3c58: Image Version: 0.0
3aa0.3c58: SizeOfImage: 0x7dd00 (515328)
3aa0.3c58: Resource Dir: 0x7b380 LB 0x350
3aa0.3c58: ProductName: SYSCORE
3aa0.3c58: FileVersion: SYSCORE. Proprietary information hidden
3aa0.3c58: PrivateBuild: SYSCORE. Proprietary information hidden F17,F18
3aa0.3c58: FileDescription: McAfee Core Firewall Engine Driver
3aa0.3c58: \SystemRoot\System32\drivers\mfehidk.sys:
3aa0.3c58: CreationTime: 2015-08-28T15:53:28.622920900Z
3aa0.3c58: LastWriteTime: 2014-10-01T16:16:28.000000000Z
3aa0.3c58: ChangeTime: 2016-03-30T17:55:22.161408100Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0xbff80
3aa0.3c58: NT Headers: 0xf0
3aa0.3c58: Timestamp: 0x54234511
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x54234511
3aa0.3c58: Image Version: 0.0
3aa0.3c58: SizeOfImage: 0xbce80 (773760)
3aa0.3c58: Resource Dir: 0xba880 LB 0x348
3aa0.3c58: ProductName: SYSCORE
3aa0.3c58: FileVersion: SYSCORE. Proprietary information hidden
3aa0.3c58: PrivateBuild: SYSCORE. Proprietary information hidden F14,F15,F16,F18,F20
3aa0.3c58: FileDescription: McAfee Link Driver
3aa0.3c58: \SystemRoot\System32\drivers\mfewfpk.sys:
3aa0.3c58: CreationTime: 2015-08-28T15:53:26.153475700Z
3aa0.3c58: LastWriteTime: 2014-10-01T16:18:18.000000000Z
3aa0.3c58: ChangeTime: 2016-03-30T17:55:22.192609100Z
3aa0.3c58: FileAttributes: 0x20
3aa0.3c58: Size: 0x55190
3aa0.3c58: NT Headers: 0xf8
3aa0.3c58: Timestamp: 0x54234523
3aa0.3c58: Machine: 0x8664 - amd64
3aa0.3c58: Timestamp: 0x54234523
3aa0.3c58: Image Version: 0.0
3aa0.3c58: SizeOfImage: 0x52a80 (338560)
3aa0.3c58: Resource Dir: 0x51f00 LB 0x348
3aa0.3c58: ProductName: SYSCORE
3aa0.3c58: FileVersion: SYSCORE. Proprietary information hidden
3aa0.3c58: PrivateBuild: SYSCORE. Proprietary information hidden F17,F18
3aa0.3c58: FileDescription: Anti-Virus Mini-Firewall Driver
3aa0.3c58: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
3aa0.3c58: Calling main()
3aa0.3c58: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2
3aa0.3c58: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox'
3aa0.3c58: SUPR3HardenedMain: Respawn #1
3aa0.3c58: System32: \Device\HarddiskVolume2\Windows\System32
3aa0.3c58: WinSxS: \Device\HarddiskVolume2\Windows\winsxs
3aa0.3c58: KnownDllPath: C:\WINDOWS\system32
3aa0.3c58: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
3aa0.3c58: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe)
3aa0.3c58: supR3HardNtEnableThreadCreation:
3aa0.3c58: supR3HardNtDisableThreadCreation: pvLdrInitThunk=000000007789a0e0 pvNtTerminateThread=00000000778bc060
3aa0.3c58: supR3HardenedWinDoReSpawn(1): New child 4244.329c [kernel32].
3aa0.3c58: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd8000 cbPeb=0x380
3aa0.3c58: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077870000 uNtDllChildAddr=0000000077870000
3aa0.3c58: supR3HardenedWinSetupChildInit: uLdrInitThunk=000000007789a0e0
3aa0.3c58: supR3HardenedWinSetupChildInit: Start child.
3aa0.3c58: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 0 ms.
3aa0.3c58: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps
3aa0.3c58: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION
3aa0.3c58: *0000000000000000-fffffffffffeffff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000010000-ffffffffffffffff 0x0004/0x0004 0x0040000
3aa0.3c58: *0000000000020000-000000000001efff 0x0002/0x0002 0x0040000
3aa0.3c58: 0000000000021000-0000000000011fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000030000-000000000002efff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000031000-0000000000021fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000040000-fffffffffff43fff 0x0000/0x0004 0x0020000
3aa0.3c58: 000000000013c000-0000000000138fff 0x0104/0x0004 0x0020000
3aa0.3c58: 000000000013f000-000000000013dfff 0x0004/0x0004 0x0020000
3aa0.3c58: *0000000000140000-000000000013bfff 0x0002/0x0002 0x0040000
3aa0.3c58: 0000000000144000-0000000000137fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000150000-000000000014efff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000151000-0000000000141fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000160000-000000000015efff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000160000 (LB 0x1000, 0000000000160000 LB 0x1000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000160000/0000000000160000 LB 0/0x1000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000160000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000000000001
3aa0.3c58: 0000000000161000-0000000000151fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000170000-0000000000108fff 0x0002/0x0002 0x0040000
3aa0.3c58: 00000000001d7000-00000000001cdfff 0x0001/0x0000 0x0000000
3aa0.3c58: *00000000001e0000-00000000001defff 0x0002/0x0002 0x0040000
3aa0.3c58: 00000000001e1000-00000000001d1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *00000000001f0000-00000000001eefff 0x0002/0x0002 0x0040000
3aa0.3c58: 00000000001f1000-00000000001e1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000200000-00000000001fefff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000201000-00000000001f1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000210000-000000000020efff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000211000-00000000001b1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000270000-0000000000176fff 0x0000/0x0004 0x0020000
3aa0.3c58: 0000000000369000-0000000000366fff 0x0104/0x0004 0x0020000
3aa0.3c58: 000000000036b000-0000000000365fff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000370000-00000000002affff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000430000-0000000000427fff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000438000-000000000042ffff 0x0000/0x0004 0x0020000
3aa0.3c58: 0000000000440000-00000000003fffff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000480000-000000000042cfff 0x0004/0x0004 0x0020000
3aa0.3c58: 00000000004d3000-0000000000425fff 0x0000/0x0004 0x0020000
3aa0.3c58: *0000000000580000-0000000000547fff 0x0004/0x0004 0x0020000
3aa0.3c58: 00000000005b8000-00000000004effff 0x0000/0x0004 0x0020000
3aa0.3c58: *0000000000680000-0000000000647fff 0x0004/0x0004 0x0020000
3aa0.3c58: 00000000006b8000-00000000005effff 0x0000/0x0004 0x0020000
3aa0.3c58: *0000000000780000-0000000000776fff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000000789000-0000000000781fff 0x0000/0x0004 0x0020000
3aa0.3c58: 0000000000790000-000000000077ffff 0x0001/0x0000 0x0000000
3aa0.3c58: *00000000007a0000-000000000079cfff 0x0004/0x0004 0x0020000
3aa0.3c58: 00000000007a3000-0000000000725fff 0x0000/0x0004 0x0020000
3aa0.3c58: *0000000000820000-0000000000802fff 0x0002/0x0002 0x0040000
3aa0.3c58: 000000000083d000-00000000006d9fff 0x0000/0x0002 0x0040000
3aa0.3c58: 00000000009a0000-000000000099cfff 0x0002/0x0002 0x0040000
3aa0.3c58: 00000000009a3000-000000000099dfff 0x0000/0x0002 0x0040000
3aa0.3c58: 00000000009a8000-000000000099ffff 0x0001/0x0000 0x0000000
3aa0.3c58: *00000000009b0000-000000000082efff 0x0002/0x0002 0x0040000
3aa0.3c58: 0000000000b31000-0000000000b21fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000000b40000-0000000000939fff 0x0002/0x0002 0x0040000
3aa0.3c58: 0000000000d46000-ffffffffffb4bfff 0x0000/0x0002 0x0040000
3aa0.3c58: 0000000001f40000-0000000001efffff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000001f80000-0000000001e83fff 0x0000/0x0004 0x0020000
3aa0.3c58: 000000000207c000-0000000002079fff 0x0104/0x0004 0x0020000
3aa0.3c58: 000000000207e000-000000000207bfff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000002080000-0000000001feffff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000002110000-0000000002108fff 0x0004/0x0004 0x0020000
3aa0.3c58: 0000000002117000-000000000209dfff 0x0000/0x0004 0x0020000
3aa0.3c58: *0000000002190000-0000000001ec0fff 0x0002/0x0002 0x0040000
3aa0.3c58: 000000000245f000-ffffffffff34dfff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000005570000-0000000005570fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files (x86)\Blue Coat\ProxyClient\proxyclient64.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000005570000 (0000000005570000 LB 0x1000) - 'proxyclient64.dll'
3aa0.3c58: 0000000005571000-ffffffff93971fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000077170000-0000000077170fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\user32.dll
3aa0.3c58: 0000000077171000-00000000771f1fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\user32.dll
3aa0.3c58: 00000000771f2000-0000000077201fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\user32.dll
3aa0.3c58: 0000000077202000-0000000077203fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\user32.dll
3aa0.3c58: 0000000077204000-0000000077269fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\user32.dll
3aa0.3c58: 000000007726a000-0000000077113fff 0x0001/0x0000 0x0000000
3aa0.3c58: *00000000773c0000-00000000773affff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 00000000773c0000 (LB 0x10000, 00000000773c0000 LB 0x10000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [00000000773c0000/00000000773c0000 LB 0/0x10000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/00000000773c0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: *00000000773d0000-00000000773d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000773d1000-00000000773ecfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000773ed000-00000000773edfff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000773ee000-000000007746bfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 000000007746c000-00000000774d9fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000774da000-00000000774dbfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000774dc000-00000000774eefff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\kernel32.dll
3aa0.3c58: 00000000774ef000-000000007717dfff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000077860000-000000007784ffff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000077860000 (LB 0x10000, 0000000077860000 LB 0x10000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000077860000/0000000077860000 LB 0/0x10000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000077860000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: *0000000077870000-0000000077870fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 0000000077871000-0000000077894fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 0000000077895000-0000000077895fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 0000000077896000-000000007796dfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 000000007796e000-000000007799cfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 000000007799d000-000000007799dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 000000007799e000-000000007799efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 000000007799f000-000000007799ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a0000-00000000779a1fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a2000-00000000779a2fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a3000-00000000779a5fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a6000-00000000779a7fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a8000-00000000779a8fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779a9000-00000000779aafff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 00000000779ab000-0000000077a19fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll
3aa0.3c58: 0000000077a1a000-00000000779f3fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000077a40000-0000000077a40fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\psapi.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000077a40000 (0000000077a40000 LB 0x1000) - 'psapi.dll'
3aa0.3c58: 0000000077a41000-00000000704a1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000000007efe0000-000000007efdafff 0x0002/0x0002 0x0040000
3aa0.3c58: 000000007efe5000-000000007eee9fff 0x0000/0x0002 0x0040000
3aa0.3c58: *000000007f0e0000-000000007e1dffff 0x0000/0x0002 0x0020000
3aa0.3c58: *000000007ffe0000-000000007ffdefff 0x0002/0x0002 0x0020000
3aa0.3c58: 000000007ffe1000-000000007ffd1fff 0x0000/0x0002 0x0020000
3aa0.3c58: 000000007fff0000-ffffffffc095ffff 0x0001/0x0000 0x0000000
3aa0.3c58: *000000013f680000-000000013f680fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f681000-000000013f707fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f708000-000000013f708fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f709000-000000013f753fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f754000-000000013f760fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f761000-000000013f7abfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe
3aa0.3c58: 000000013f7ac000-00000000fef57fff 0x0001/0x0000 0x0000000
3aa0.3c58: *0000000180000000-0000000180000fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files (x86)\Blue Coat\ProxyClient\EasyHook64.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 0000000180000000 (0000000180000000 LB 0x1000) - 'EasyHook64.dll'
3aa0.3c58: 0000000180001000-fffff80404f41fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefb0c0000-000007fefb0affff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefb0c0000 (LB 0x10000, 000007fefb0c0000 LB 0x10000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefb0c0000/000007fefb0c0000 LB 0/0x10000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefb0c0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: *000007fefb0d0000-000007fefb0d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\netapi32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefb0d0000 (000007fefb0d0000 LB 0x1000) - 'netapi32.dll'
3aa0.3c58: 000007fefb0d1000-000007fef99d1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefc7d0000-000007fefc7d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\wkscli.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefc7d0000 (000007fefc7d0000 LB 0x1000) - 'wkscli.dll'
3aa0.3c58: 000007fefc7d1000-000007fefbec1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefd0e0000-000007fefd0e0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\netutils.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd0e0000 (000007fefd0e0000 LB 0x1000) - 'netutils.dll'
3aa0.3c58: 000007fefd0e1000-000007fefcd51fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefd470000-000007fefd470fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\version.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd470000 (000007fefd470000 LB 0x1000) - 'version.dll'
3aa0.3c58: 000007fefd471000-000007fefd041fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefd8a0000-000007fefd88ffff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefd8a0000 (LB 0x10000, 000007fefd8a0000 LB 0x10000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefd8a0000/000007fefd8a0000 LB 0/0x10000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefd8a0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: *000007fefd8b0000-000007fefd89ffff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007fefd8b0000 (LB 0x10000, 000007fefd8b0000 LB 0x10000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007fefd8b0000/000007fefd8b0000 LB 0/0x10000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007fefd8b0000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: *000007fefd8c0000-000007fefd8c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\srvcli.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefd8c0000 (000007fefd8c0000 LB 0x1000) - 'srvcli.dll'
3aa0.3c58: 000007fefd8c1000-000007fefd4f1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefdc90000-000007fefdc90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\AppSense\Environment Manager\Agent\EmLoader.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefdc90000 (000007fefdc90000 LB 0x1000) - 'EmLoader.dll'
3aa0.3c58: 000007fefdc91000-000007fefd931fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefdff0000-000007fefdff0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
3aa0.3c58: 000007fefdff1000-000007fefe039fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
3aa0.3c58: 000007fefe03a000-000007fefe04efff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
3aa0.3c58: 000007fefe04f000-000007fefe050fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
3aa0.3c58: 000007fefe051000-000007fefe059fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\KernelBase.dll
3aa0.3c58: 000007fefe05a000-000007fefdf73fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe140000-000007fefe140fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\oleaut32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe140000 (000007fefe140000 LB 0x1000) - 'oleaut32.dll'
3aa0.3c58: 000007fefe141000-000007fefe061fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe220000-000007fefe220fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\imm32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe220000 (000007fefe220000 LB 0x1000) - 'imm32.dll'
3aa0.3c58: 000007fefe221000-000007fefe1f1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe250000-000007fefe250fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\msctf.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe250000 (000007fefe250000 LB 0x1000) - 'msctf.dll'
3aa0.3c58: 000007fefe251000-000007fefe141fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe360000-000007fefe360fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\lpk.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe360000 (000007fefe360000 LB 0x1000) - 'lpk.dll'
3aa0.3c58: 000007fefe361000-000007fefe2b1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe410000-000007fefe410fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\rpcrt4.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe410000 (000007fefe410000 LB 0x1000) - 'rpcrt4.dll'
3aa0.3c58: 000007fefe411000-000007fefe2e1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe540000-000007fefe540fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\msvcrt.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe540000 (000007fefe540000 LB 0x1000) - 'msvcrt.dll'
3aa0.3c58: 000007fefe541000-000007fefe2c1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe7c0000-000007fefe7c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ole32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe7c0000 (000007fefe7c0000 LB 0x1000) - 'ole32.dll'
3aa0.3c58: 000007fefe7c1000-000007fefe5b1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fefe9d0000-000007fefe9d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\advapi32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007fefe9d0000 (000007fefe9d0000 LB 0x1000) - 'advapi32.dll'
3aa0.3c58: 000007fefe9d1000-000007fefdae1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feff8c0000-000007feff8c0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\nsi.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feff8c0000 (000007feff8c0000 LB 0x1000) - 'nsi.dll'
3aa0.3c58: 000007feff8c1000-000007feff8b1fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feff8d0000-000007feff8d0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\usp10.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feff8d0000 (000007feff8d0000 LB 0x1000) - 'usp10.dll'
3aa0.3c58: 000007feff8d1000-000007feff801fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feff9a0000-000007feff9a0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ws2_32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feff9a0000 (000007feff9a0000 LB 0x1000) - 'ws2_32.dll'
3aa0.3c58: 000007feff9a1000-000007feff951fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feff9f0000-000007feff9f0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\gdi32.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feff9f0000 (000007feff9f0000 LB 0x1000) - 'gdi32.dll'
3aa0.3c58: 000007feff9f1000-000007feff981fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feffa60000-000007feffa5dfff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007feffa60000 (LB 0x2000, 000007feffa60000 LB 0x2000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007feffa60000/000007feffa60000 LB 0/0x2000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007feffa60000 LB 0x10000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: 000007feffa62000-000007feffa53fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feffa70000-000007feffa6dfff 0x0040/0x0040 0x0020000 !!
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 000007feffa70000 (LB 0x2000, 000007feffa70000 LB 0x2000)
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [000007feffa70000/000007feffa70000 LB 0/0x2000]
3aa0.3c58: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/000007feffa70000 LB 0x90000 s=0x10000 ap=0x0 rp=0x00000100000001
3aa0.3c58: 000007feffa72000-000007feff9e3fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feffb00000-000007feffb00fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\sechost.dll
3aa0.3c58: supHardNtVpScanVirtualMemory: Unmapping image mem at 000007feffb00000 (000007feffb00000 LB 0x1000) - 'sechost.dll'
3aa0.3c58: 000007feffb01000-000007feffa71fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007feffb90000-000007feffb90fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll
3aa0.3c58: 000007feffb91000-000007fdff771fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fffffb0000-000007fffff8cfff 0x0002/0x0002 0x0040000
3aa0.3c58: 000007fffffd3000-000007fffffcdfff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fffffd8000-000007fffffd6fff 0x0004/0x0004 0x0020000
3aa0.3c58: 000007fffffd9000-000007fffffd7fff 0x0001/0x0000 0x0000000
3aa0.3c58: *000007fffffda000-000007fffffd7fff 0x0004/0x0004 0x0020000
3aa0.3c58: *000007fffffdc000-000007fffffd9fff 0x0004/0x0004 0x0020000
3aa0.3c58: *000007fffffde000-000007fffffdbfff 0x0004/0x0004 0x0020000
3aa0.3c58: *000007fffffe0000-000007fffffcffff 0x0001/0x0002 0x0020000
3aa0.3c58: apisetschema.dll: timestamp 0x56a1c9c8 (rc=VINF_SUCCESS)
3aa0.3c58: kernelbase.dll: timestamp 0x56a1cb26 (rc=VINF_SUCCESS)
3aa0.3c58: VirtualBox.exe: timestamp 0x569e6712 (rc=VINF_SUCCESS)
3aa0.3c58: kernel32.dll: timestamp 0x56a1cb25 (rc=VINF_SUCCESS)
3aa0.3c58: user32.dll: timestamp 0x56423d2a (rc=VINF_SUCCESS)
3aa0.3c58: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports
3aa0.3c58: Error (rc=-5663):
3aa0.3c58: The process already has KERNEL32.DLL loaded.
3aa0.3c58: Error (rc=-5663):
3aa0.3c58: supHardenedWinVerifyProcess failed with Unknown Status -5663 (0xffffe9e1): The process already has KERNEL32.DLL loaded.
3aa0.3c58: Error -5663 in supR3HardNtChildPurify! (enmWhat=5)
3aa0.3c58: supHardenedWinVerifyProcess failed with Unknown Status -5663 (0xffffe9e1): The process already has KERNEL32.DLL loaded.
3aa0.3c58: supR3HardNtEnableThreadCreation:
AIG
US
connect to Pega PVS - 6.2 SP2 DB (DB2) and Pega 7 DB (PostgreSQL) using the below details.
Pega 6.2 SP2 PVS DB2 Access
Hostname = prpc
port = 50000
Database = PEGA
Username/password = db2inst1/password
After launching PVS using VMWare client, I have connected to DB2 using the above details through SQL Developer.
Pega 7 PVS PostgreSQL DB Access
- Configuration changes in Linux DB2
- login as root/password
- vi /etc/postgresql/9.1/main/postgresql.conf
- Change the line from listen_addresses=’localhost’ to listen_addresses=’*’ (uncomment as well)
- vi /etc/postgresql/9.1/main/pg_hba.conf
- add a line under: local all postgres peer
- host all all Proprietary information hidden/0 trust
- add a line under: local all postgres peer
- /etc/init.d/postgresql restart
- After above configuration changes, I am able to connect to PostgreSQL using Squirrel with below details.
1. User Name : postgres
2. Password : prpc
Driver : PostgreSQL
URL : jdbc:postgresql:[<//host>[:<5432>/]]<database>
connect to Pega PVS - 6.2 SP2 DB (DB2) and Pega 7 DB (PostgreSQL) using the below details.
Pega 6.2 SP2 PVS DB2 Access
Hostname = prpc
port = 50000
Database = PEGA
Username/password = db2inst1/password
After launching PVS using VMWare client, I have connected to DB2 using the above details through SQL Developer.
Pega 7 PVS PostgreSQL DB Access
- Configuration changes in Linux DB2
- login as root/password
- vi /etc/postgresql/9.1/main/postgresql.conf
- Change the line from listen_addresses=’localhost’ to listen_addresses=’*’ (uncomment as well)
- vi /etc/postgresql/9.1/main/pg_hba.conf
- add a line under: local all postgres peer
- host all all Proprietary information hidden/0 trust
- add a line under: local all postgres peer
- /etc/init.d/postgresql restart
- After above configuration changes, I am able to connect to PostgreSQL using Squirrel with below details.
1. User Name : postgres
2. Password : prpc
Driver : PostgreSQL
URL : jdbc:postgresql:[<//host>[:<5432>/]]<database>
Example: jdbc:postgresql:// Proprietary information hidden:5432/pega
Pegasystems Inc.
US
Sudheer,
I apologize for missing your post from 5 days back. Sorry :(
I see where the VM is failing to startup - and it could be a patching issue of a DLL in windows. Contact me at [email protected]
I want to send you a link to a different VM (do not want to make it public).
eddie