[2019/05/31 16:33:49.154 1132:1428 2] Log File Created. Version 8.05.3663
[2019/05/31 16:33:50.168 1132:1428 2]
********** Start of Task : RebootTo **********
[2019/05/31 16:33:50.168 1132:1428 2] DeploymentSolutionAgent_Task.cpp@118::Run()
[2019/05/31 16:33:50.168 1132:1428 2] DeploymentSolutionAgent_Task.cpp@119::Run(). Task XML is PXE
[2019/05/31 16:33:50.168 1132:1428 2] DeploymentSolutionAgent_Task.cpp@127::Checking for CEM Enabled Client..
[2019/05/31 16:33:50.168 1132:1428 1] util::CWebUtil::IsCEMModeActive:1126 : CWebUtil::IsCEMModeActive() called.
[2019/05/31 16:33:50.168 1132:1428 1] util::CWebUtil::IsCEMModeActive:1131 : GetServerConnectionStatus, dwStatus=0.
[2019/05/31 16:33:50.168 1132:1428 2] DeploymentSolutionAgent_Task.cpp@141:: INFO - Client is not on active CEM environment.
[2019/05/31 16:33:50.168 1132:1428 0] xml = PXE
[2019/05/31 16:33:50.168 1132:1428 1] Target Environment and the current environment are same, nothing to do.
[2019/05/31 16:33:50.168 1132:1428 2] RebootTo::SetResult called.
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteCommand.cpp@4445 ExecuteClass::SetResult() - StopTaskCmdReceived = 0
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteCommand.cpp:util::ExecuteClass::SetResult():4463. Value of nResult(@ReturnValue) = 0, Value of bResult(@Success) = 1
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteCommand.cpp@4487 Task have completed. Successful return.
[2019/05/31 16:33:50.168 1132:1428 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:33:50.168 1132:1428 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\GhConfig64.exe
[2019/05/31 16:33:50.168 1132:1428 1] ExecuteClass::Commandline = /findactivewindows
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:33:50.168 1132:1428 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:33:50.168 1132:1428 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:33:50.168 1132:1428 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 16:33:50.644 1132:1428 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 16:33:50.644 1132:1428 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=0
[2019/05/31 16:33:50.644 1132:1428 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1709. Attempting to open file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:33:50.644 1132:1428 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1714. Found file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:33:50.801 1132:1428 1]
********** End of Task : RebootTo **********
[2019/05/31 16:34:18.612 1132:1884 2]
********** Start of Task : ClientPreImage **********
[2019/05/31 16:34:18.612 1132:1884 2] DeploymentSolutionAgent_Task.cpp@118::Run()
[2019/05/31 16:34:18.612 1132:1884 2] DeploymentSolutionAgent_Task.cpp@119::Run(). Task XML is @DomainCredentialXML@ClientAdministratorCredentialXMLWindows 10True<?xml version="1.0" encoding="utf-8"?>
<unattend xmlns="urn:schemas-microsoft-com:unattend">
<settings pass="specialize">
<component name="Microsoft-Windows-Shell-Setup" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<ComputerName>@compName</ComputerName>
</component>
<component name="Microsoft-Windows-TCPIP" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
@microsoftWindowsTCPIP
</component>
<component name="Microsoft-Windows-DNS-Client" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
@microsoftWindowsDNSClient
</component>
<component name="Microsoft-Windows-NetBT" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
@microsoftWindowsNetBT
</component>
<component name="Microsoft-Windows-UnattendedJoin" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
@microsoftWindowsUnattendedJoin
</component>
</settings>
<settings pass="oobeSystem">
<component name="Microsoft-Windows-Shell-Setup" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<OOBE>
<HideEULAPage>true</HideEULAPage>
<NetworkLocation>Work</NetworkLocation>
<ProtectYourPC>1</ProtectYourPC>
<SkipMachineOOBE>true</SkipMachineOOBE>
<SkipUserOOBE>true</SkipUserOOBE>
</OOBE>
<RegisteredOrganization>@domainou</RegisteredOrganization>
<RegisteredOwner>@userName</RegisteredOwner>
<TimeZone>@timezone</TimeZone>
</component>
</settings>
<settings pass="generalize">
<component name="Microsoft-Windows-PnpSysprep" processorArchitecture="@ProcessArchitecture" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<PersistAllDeviceInstalls>true</PersistAllDeviceInstalls>
</component>
</settings>
</unattend>
USE EXISTING KEYPXE
[2019/05/31 16:34:18.612 1132:1884 2] DeploymentSolutionAgent_Task.cpp@127::Checking for CEM Enabled Client..
[2019/05/31 16:34:18.612 1132:1884 1] util::CWebUtil::IsCEMModeActive:1126 : CWebUtil::IsCEMModeActive() called.
[2019/05/31 16:34:18.612 1132:1884 1] util::CWebUtil::IsCEMModeActive:1131 : GetServerConnectionStatus, dwStatus=0.
[2019/05/31 16:34:18.612 1132:1884 2] DeploymentSolutionAgent_Task.cpp@141:: INFO - Client is not on active CEM environment.
[2019/05/31 16:34:18.612 1132:1884 2] EnableWow64
[2019/05/31 16:34:18.612 1132:1884 2] OS is Vista and Above using Wow64 Redirection
[2019/05/31 16:34:18.612 1132:1884 2] We are in automation. Report that the Prepare for Capture Image Handler succeeded.
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteCommand.cpp@4445 ExecuteClass::SetResult() - StopTaskCmdReceived = 0
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteCommand.cpp:util::ExecuteClass::SetResult():4463. Value of nResult(@ReturnValue) = 0, Value of bResult(@Success) = 1
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteCommand.cpp@4487 Task have completed. Successful return.
[2019/05/31 16:34:18.612 1132:1884 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:34:18.612 1132:1884 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\GhConfig64.exe
[2019/05/31 16:34:18.612 1132:1884 1] ExecuteClass::Commandline = /findactivewindows
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:34:18.612 1132:1884 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:34:18.612 1132:1884 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:34:18.612 1132:1884 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 16:34:19.19 1132:1884 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 16:34:19.19 1132:1884 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=0
[2019/05/31 16:34:19.19 1132:1884 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1709. Attempting to open file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:34:19.19 1132:1884 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1714. Found file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:34:19.35 1132:1884 1]
********** End of Task : ClientPreImage **********
[2019/05/31 16:34:26.266 1132:1924 2]
********** Start of Task : ClientCaptureImage **********
[2019/05/31 16:34:26.266 1132:1924 2] DeploymentSolutionAgent_Task.cpp@118::Run()
[2019/05/31 16:34:26.266 1132:1924 2] DeploymentSolutionAgent_Task.cpp@119::Run(). Task XML is False@credentialXML800@imageTool1win10.gho1 -z2 -batch -sure -clone,MODE=create,SRC=1,DST=@fullImagePathfalse0false
[2019/05/31 16:34:26.266 1132:1924 2] DeploymentSolutionAgent_Task.cpp@127::Checking for CEM Enabled Client..
[2019/05/31 16:34:26.266 1132:1924 1] util::CWebUtil::IsCEMModeActive:1126 : CWebUtil::IsCEMModeActive() called.
[2019/05/31 16:34:26.266 1132:1924 1] util::CWebUtil::IsCEMModeActive:1131 : GetServerConnectionStatus, dwStatus=0.
[2019/05/31 16:34:26.266 1132:1924 2] DeploymentSolutionAgent_Task.cpp@141:: INFO - Client is not on active CEM environment.
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@158::Run()
[2019/05/31 16:34:26.266 1132:1924 1] util::CWebUtil::GetMachineIP : 315 : MachineIP via NtwrkTx :
[2019/05/31 16:34:26.266 1132:1924 1] util::CWebUtil::GetMachineIP : 326 : GetIPAddress returned: 192.168.2.20
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@182 댰dz
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@320::ClientCaptureImage()
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@345 =False
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@356 Output @isHTTP=False
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@364 =1
[2019/05/31 16:34:26.266 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@388 Output @imageType=1
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@394 =win10.gho
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@399 Output @imageName=win10.gho
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@406 =
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@410 Output @description=
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@421 = -z2 -batch -sure -clone,MODE=create,SRC=1,DST=@fullImagePath
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@435 Input @DS_OSType=Windows 10
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@449 DS_OSType=Windows 10
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@492 Input Param @HTTPPathOnPS(m_wstrHTTPPath) ={bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@498 Output @OSType=Windows 10
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@506 Input Parameter @resourceGuid=
[2019/05/31 16:34:26.282 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@508 Setting Outper Parameter @resourceGuid
[2019/05/31 16:34:26.282 1132:1924 2] We are in automation.
[2019/05/31 16:34:26.282 1132:1924 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:34:26.282 1132:1924 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\GhConfig64.exe
[2019/05/31 16:34:26.282 1132:1924 1] ExecuteClass::Commandline = /findactivewindows
[2019/05/31 16:34:26.282 1132:1924 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:34:26.282 1132:1924 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:34:26.282 1132:1924 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:34:26.282 1132:1924 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:34:26.282 1132:1924 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:34:26.282 1132:1924 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=0
[2019/05/31 16:34:26.507 1132:1924 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1709. Attempting to open file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:34:26.507 1132:1924 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1714. Found file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 16:34:26.507 1132:1924 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:34:26.507 1132:1924 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\GhConfig64.exe
[2019/05/31 16:34:26.507 1132:1924 1] ExecuteClass::Commandline = /translate=C:
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:34:26.507 1132:1924 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:34:26.507 1132:1924 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:34:26.522 1132:1924 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 16:34:26.616 1132:1924 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 16:34:26.616 1132:1924 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=1
[2019/05/31 16:34:26.616 1132:1924 1] 硅捥瑵䍥浯慭摮挮灰:2689 - first [ImagingDisk =1] and [windowsDisk=1:3]
[2019/05/31 16:34:26.616 1132:1924 1] 硅捥瑵䍥浯慭摮挮灰:2708 - second [ImagingDisk =1] and [windowsDisk=1]
[2019/05/31 16:34:26.616 1132:1924 2] util::ExecuteClass::IsSystemDisk():ExecuteCommand.cpp:2712 - 1 is system disk
[2019/05/31 16:34:26.616 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@523 calling GetPackagePathonSS()..
[2019/05/31 16:34:26.616 1132:1924 1] util::CWebUtil::GetMachineIP : 315 : MachineIP via NtwrkTx :
[2019/05/31 16:34:26.632 1132:1924 1] util::CWebUtil::GetMachineIP : 326 : GetIPAddress returned: 192.168.2.20
[2019/05/31 16:34:26.632 1132:1924 2] Function Name is util::CSMPPackage::getNearestPackageInfoXML(),file name is SMPPackage.cpp and Line no 333.Reuest XML is /Deployment/Agent/GetNearestPackageServerInfo.aspx?xml=packageserver{7772179F-A269-4100-8BF6-46EDC0E7F779}192.168.2.20
[2019/05/31 16:34:26.679 1132:1924 2] Function Name is util::CSMPPackage::getNearestPackageInfoXML(),file name is SMPPackage.cpp and Line no 343. Response of getNearestPackageInfoXML = trueITMS192.168.2.18150f755-6ddd-4aa1-b484-c2286c3f2a27truePkgSvrHostD$
[2019/05/31 16:34:26.679 1132:1924 2] Function Name is util::CSMPPackage::ParsePackageInfoXML(),file name is SMPPackage.cpp and Line no 360. Return XML is =trueITMS192.168.2.18150f755-6ddd-4aa1-b484-c2286c3f2a27truePkgSvrHostD$
[2019/05/31 16:34:26.679 1132:1924 2] Function:util::CSMPPackage::Initialiaze(),File:SMPPackage.cpp and Line:109.ITMS have selected as a PS
[2019/05/31 16:34:26.679 1132:1924 2] Function Name is util::CSMPPackage::callDSPSInfoOperationService(),file name is SMPPackage.cpp and Line no 222.Reuest XML is https://ITMS:443/Altiris/DSPS/DSPSPackageInfo.aspx?xml={bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}
[2019/05/31 16:34:30.6 1132:1924 2] Function Name is util::CSMPPackage::callDSPSInfoOperationService(),file name is SMPPackage.cpp and Line no 244. Return XML is =PkgSvrHostD$https://ITMS:443/Altiris/PS/Share/pkggroup_{4dd1fb09-cb13-49bb-a546-f1ccf8f28cbe}/{bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}/cache
[2019/05/31 16:34:30.6 1132:1924 2] Function Name is util::ExecuteClass::LogPath(),file name is ExecuteCommand.cpp and Line no 907. path is is =https://*:*itms:443/altiris/ps/share/pkggroup_{4dd1fb09-cb13-49bb-a546-f1ccf8f28cbe}/{bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}/cache/win10.gho
[2019/05/31 16:34:30.6 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@541 Removing Username and Password from Commandline for logging only
[2019/05/31 16:34:30.6 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@830 ExecuteCommand()
[2019/05/31 16:34:30.6 1132:1924 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:34:30.6 1132:1924 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\Ghost64.exe
[2019/05/31 16:34:30.6 1132:1924 1] ExecuteClass:: Commandline contains the credentials hence hiding it...
[2019/05/31 16:34:30.6 1132:1924 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:34:30.6 1132:1924 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:34:30.6 1132:1924 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:34:30.6 1132:1924 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:34:30.6 1132:1924 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:34:30.22 1132:1924 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 16:34:34.867 1132:1924 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 16:34:34.867 1132:1924 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=1
[2019/05/31 16:34:34.883 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp:883 ExecuteCommand returned lientCaptureImage Task, Execute, Process returned 0
[2019/05/31 16:34:34.883 1132:1924 2] tcube::ClientCaptureImage::tryOtherPath(): HTTP have failed and trying UNC path
[2019/05/31 16:34:34.883 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@523 calling GetPackagePathonSS()..
[2019/05/31 16:34:34.961 1132:1924 2] Function:util::CNetShare::DoMapping,File:NetShare.cpp,Line:64.Z: have mapped to \\ITMS\PkgSvrHostD$
[2019/05/31 16:34:34.961 1132:1924 2] Function Name is util::ExecuteClass::LogPath(),file name is ExecuteCommand.cpp and Line no 907. path is is =z:\{bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}\cache\win10.gho
[2019/05/31 16:34:34.961 1132:1924 2] ..\ClientCaptureImage\Tcube_ClientCaptureImage.cpp@830 ExecuteCommand()
[2019/05/31 16:34:34.961 1132:1924 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 16:34:34.961 1132:1924 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\Ghost64.exe
[2019/05/31 16:34:34.961 1132:1924 1] ExecuteClass::Commandline = -z2 -batch -sure -clone,MODE=create,SRC=1,DST="Z:\{bcbca6f0-f5f8-4b26-ab42-a9b46de418b7}\cache\win10.gho"
[2019/05/31 16:34:34.977 1132:1924 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 16:34:34.977 1132:1924 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 16:34:34.977 1132:1924 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 16:34:34.977 1132:1924 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 16:34:34.977 1132:1924 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 16:34:34.977 1132:1924 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 17:59:05.450 1132:1432 2] DeploymentSolutionAgent_Task.cpp@363::DeploymentSolutionAgent_Task::Stop() called.
[2019/05/31 17:59:05.450 1132:1432 2] DeploymentSolutionAgent_Task.cpp@380::DeploymentSolutionAgent_Task::Stop()- Process Terminated successfully.
[2019/05/31 17:59:05.512 1132:1924 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 1
[2019/05/31 17:59:05.528 1132:1924 0] File:ExecuteCommand.cpp,Line:4393 ERROR: The Exception have occured in Client Imaging Task.
Exception has occured in function ExecuteCommand.cpp() at Line No 2071. Type of exception is ExecuteClassException. Error is Default Message: Exception in ExecuteClassException. Error Description is "Deployment Solution: The task has been stopped on user's request
". Value of Windows error code = 1067 and message is " The process terminated unexpectedly.
"
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp@4445 ExecuteClass::SetResult() - StopTaskCmdReceived = 0
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp:util::ExecuteClass::SetResult():4463. Value of nResult(@ReturnValue) = 1, Value of bResult(@Success) = 0
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp@4482 Output @errorMessage=The Exception have occured in Client Imaging Task.
Exception has occured in function ExecuteCommand.cpp() at Line No 2071. Type of exception is ExecuteClassException. Error is Default Message: Exception in ExecuteClassException. Error Description is "Deployment Solution: The task has been stopped on user's request
". Value of Windows error code = 1067 and message is " The process terminated unexpectedly.
"
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp@4491 Task have completed. Failure return!!
[2019/05/31 17:59:05.528 1132:1924 1] ****** ExecuteClass:: In ExecuteCommandNoUser ******
[2019/05/31 17:59:05.528 1132:1924 1] ExecuteClass::Module Name = X:\Program Files\Symantec\Deployment\Ghost\GhConfig64.exe
[2019/05/31 17:59:05.528 1132:1924 1] ExecuteClass::Commandline = /findactivewindows
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp@1932 calling ExecuteClass::ExecuteCommandNoUser().
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteClass::@1965 Application Name is NOT NULL.
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteClass::@1980 Command line is NOT NULL.
[2019/05/31 17:59:05.528 1132:1924 2] ExecuteCommand.cpp@1984 ExecuteClass::ExecuteCommandNoUser() - StopTaskCmdReceived = 0
[2019/05/31 17:59:05.528 1132:1924 1] ExecuteCommandNoUser()Successfully created process. nResult =1
[2019/05/31 17:59:05.528 1132:1924 1] Calling ExecuteClass::ProcessAfterCreate()
[2019/05/31 17:59:07.665 1132:1924 2] ExecuteCommand.cpp@2065 ExecuteClass::ProcessAftercreate() - StopTaskCmdReceived = 0
[2019/05/31 17:59:07.665 1132:1924 2] ExecuteCommand.cpp@2102 ProcessAfterCreate:: dwExitCode=0
[2019/05/31 17:59:07.665 1132:1924 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1709. Attempting to open file X:\program files\Symantec\Deployment\act_wnd.txt
[2019/05/31 17:59:07.665 1132:1924 2] .util::ExecuteClass::GetActiveWindowsInstallationDrive:1714. Found file X:\program files\Symantec\Deployment\act_wnd.txt