YYYY-MM-DDT<time> Section for VMware VirtualCenter, pid=2520, version=6.0.0, build=2656760, option=Release</time>
YYYY-MM-DDT<time> verbose rhttpproxy[02460] [Originator@6876 sub=Default] Dumping early logs:</time>
YYYY-MM-DDT<time> warning rhttpproxy[02460] [Originator@6876 sub=Default] Unrecognized log/level '' using 'info'</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] Logging uses fast path: true</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] The bora/lib logs WILL be handled by VmaCore</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] Initialized channel manager</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] Current working directory: C:\Windows\system32</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] ThreadPool windowsStackImmediateCommit = true</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=ThreadPool] Thread pool on asio: Min Io, Max Io, Min Task, Max Task, Max Concurency: 2, 44, 2, 18, 2147483647</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=ThreadPool] Thread enlisted</time>
YYYY-MM-DDT<time> info rhttpproxy[04644] [Originator@6876 sub=ThreadPool] Thread enlisted</time>
YYYY-MM-DDT<time> info rhttpproxy[02460] [Originator@6876 sub=Default] Listening on HTTP port 80.</time>
YYYY-MM-DDT<time> info rhttpproxy[01096] [Originator@6876 sub=ThreadPool] Thread enlisted</time>
YYYY-MM-DDT<time> info rhttpproxy[05852] [Originator@6876 sub=ThreadPool] Thread enlisted</time>
YYYY-MM-DDT<time> info rhttpproxy[04444] [Originator@6876 sub=ThreadPool] Thread enlisted</time>
YYYY-MM-DDT<time> error rhttpproxy[02460] [Originator@6876 sub=Default] Application error: An attempt was made to access a socket in a way forbidden by its access permissions</time>
YYYY-MM-DDT<time> error rhttpproxy[02460] [Originator@6876 sub=Default] Backtrace:</time>
-->
--> [backtrace begin] product: VMware VirtualCenter, version: 6.0.0, build: build-2656760, tag: rhttpproxy
--> backtrace[00] vmacore.dll[0x001BC4DA]
--> backtrace[01] vmacore.dll[0x0005B99F]
--> backtrace[02] vmacore.dll[0x0005CACE]
--> backtrace[03] vmacore.dll[0x00012C3B]
--> backtrace[04] vmacore.dll[0x001BBA05]
--> backtrace[05] vmacore.dll[0x00165FEB]
--> backtrace[06] vmacore.dll[0x0016608A]
--> backtrace[07] vmacore.dll[0x003398A9]
--> backtrace[08] MSVCR90.dll[0x00074830]
--> backtrace[09] MSVCR90.dll[0x00043B3C]
--> backtrace[10] ntdll.dll[0x00093583]
--> backtrace[11] vmacore.dll[0x00172F69]
--> backtrace[12] vmacore.dll[0x0017FA9C]
--> backtrace[13] rhttpproxy.exe[0x00002B6F]
--> backtrace[14] rhttpproxy.exe[0x00003A08]
--> backtrace[15] rhttpproxy.exe[0x000017B3]
--> backtrace[16] sechost.dll[0x00005ADA]
--> backtrace[17] KERNEL32.DLL[0x000013D2]
--> backtrace[18] ntdll.dll[0x00015454]
--> [backtrace end]