• Welcome to Battlezone Universe.
 

News:

Welcome to the BZU Archive dated December 24, 2009. Topics and posts are in read-only mode. Those with accounts will be able to login and browse anything the account had access granted to at the time. No changes to permissions will be made to be given access to particular content. If you have any questions, please reach out to squirrelof09/Rapazzini.

Main Menu

registry hack

Started by Saloei, August 21, 2004, 09:37:12 PM

Previous topic - Next topic

Saloei

the quote below is from a file called userenv.log located in my c:\windows\debug\usermode folder. the words Impersonating user sounds a bit strange. anyone know how to find this Impersonating user?

UnloadUserProfileP: Didn't unload user profile <err = 5>
USERENV(180.184) 02:31:17:203 MyRegUnLoadKey: Failed to unmount hive 00000005
USERENV(180.184) 02:31:17:203 UnLoadClassHive: failed to unload classes key with 5
USERENV(180.184) 02:31:17:203 DumpOpenRegistryHandle: 2 user registry Handles leaked from \Registry\User\S-1-5-21-1343024091-688789844-839522115-1003_Classes
USERENV(180.184) 02:31:17:203 ReportError: Impersonating user.
USERENV(180.184) 02:34:57:562 CUserProfile::CleanupUserProfile: Ref Count is not 0
USERENV(180.184) 02:34:57:578 CUserProfile::CleanupUserProfile: Ref Count is not 0
USERENV(180.184) 02:34:57:578 CUserProfile::CleanupUserProfile: Ref Count is not 0
USERENV(180.184) 02:41:10:796 MyRegUnLoadKey: Failed to unmount hive 00000005

lasorjolt

I may be a bit dusty but I think it's a thing that allows a program running under one name to use another user's credidentials (sp). I think I've used it once but I can't really remember.