Guest User

VeyonService.log

a guest
Feb 5th, 2021
14
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 2021-02-05T08:50:32.583: [DEBUG] PluginManager::loadPlugins(): discovered plugin "AuthKeys" at "C:/Program Files/Veyon/plugins/authkeys.dll"
  2. 2021-02-05T08:50:32.583: [DEBUG] PluginManager::loadPlugins(): discovered plugin "BuiltinUltraVncServer" at "C:/Program Files/Veyon/plugins/builtin-ultravnc-server.dll"
  3. 2021-02-05T08:50:32.583: [DEBUG] PluginManager::loadPlugins(): discovered plugin "BuiltinDirectory" at "C:/Program Files/Veyon/plugins/builtindirectory.dll"
  4. 2021-02-05T08:50:32.583: [DEBUG] PluginManager::loadPlugins(): discovered plugin "Config" at "C:/Program Files/Veyon/plugins/config.dll"
  5. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "Demonstration" at "C:/Program Files/Veyon/plugins/demo.dll"
  6. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "DesktopServices" at "C:/Program Files/Veyon/plugins/desktopservices.dll"
  7. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "ExternalVncServer" at "C:/Program Files/Veyon/plugins/external-vnc-server.dll"
  8. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "FileTransfer" at "C:/Program Files/Veyon/plugins/filetransfer.dll"
  9. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "LDAP Basic" at "C:/Program Files/Veyon/plugins/ldap.dll"
  10. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "PowerControl" at "C:/Program Files/Veyon/plugins/powercontrol.dll"
  11. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "RemoteAccess" at "C:/Program Files/Veyon/plugins/remoteaccess.dll"
  12. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "ScreenLock" at "C:/Program Files/Veyon/plugins/screenlock.dll"
  13. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "Screenshot" at "C:/Program Files/Veyon/plugins/screenshot.dll"
  14. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "ServiceControl" at "C:/Program Files/Veyon/plugins/servicecontrol.dll"
  15. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "Shell" at "C:/Program Files/Veyon/plugins/shell.dll"
  16. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "SystemUserGroups" at "C:/Program Files/Veyon/plugins/systemusergroups.dll"
  17. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "TextMessage" at "C:/Program Files/Veyon/plugins/textmessage.dll"
  18. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "UserSessionControl" at "C:/Program Files/Veyon/plugins/usersessioncontrol.dll"
  19. 2021-02-05T08:50:32.599: [DEBUG] PluginManager::loadPlugins(): discovered plugin "WebAPI" at "C:/Program Files/Veyon/plugins/webapi.dll"
  20. 2021-02-05T08:50:32.614: [DEBUG] VeyonCore::initSystemInfo(): "4.5.1" "Diak-01." "winnt" "10.0.19042" "Windows 10 (10.0)" "windows" "10"
  21. 2021-02-05T08:50:32.614: [DEBUG] ServiceDataManager::ServiceDataManager():
  22. 2021-02-05T08:50:32.614: [DEBUG] PlatformSessionManager::PlatformSessionManager():
  23. 2021-02-05T08:50:32.614: [DEBUG] PlatformSessionManager::openSession(): Opening session 0 for platform session "0 (console)"
  24. 2021-02-05T08:50:33.442: [INFO] WindowsServiceCore::manageServerForActiveConsoleSession(): Session ID changed from 4294967295 to 1
  25. 2021-02-05T08:50:33.442: [DEBUG] WtsSessionManager::querySessionInformation(): 1 WtsSessionManager::SessionInfo::UserName "Diak-01"
  26. 2021-02-05T08:50:33.442: [INFO] VeyonServerProcess::start(): Starting server for WTS session 1 with user "Diak-01"
  27. 2021-02-05T08:50:33.442: [DEBUG] WindowsCoreFunctions::runProgramInSession(): "C:\\Program Files\\Veyon\\veyon-server.exe" () ("VEYON_SERVICE_DATA_TOKEN=ff02c77ba54fb5bc5c3309912856c60c2bbced95ddf4e88fbf60a43eff6fce0065f3e45f2351238b87eaa8a1348e63271787d2c033596e9a6687786ad4be4322e1d4d24cee7acb7eaf2262b994bbc66e192bce11b021138cf32c05d9cfa2a45fbeb77fa0afb40c433bfaa2cc8f1f1184c7a594869b65942fe70347977fdd168b") 808
  28.  
RAW Paste Data