Jump to content
eldo

Cryptograhic Service won't start

Recommended Posts

I guess i should have told you I tried that and full name and received a can't find message.

An object named "fishy" cannot be found. Check the selected object types and location for accuracy and ensure that you typed the object name correctly, or remove this object from the selection.

Share this post


Link to post
Share on other sites

No problem. To determine your user name click on Start and click Run and type cmd and press Enter

In the black command prompt copy and paste the following exactly as written and press Enter:

set>"%userprofile%\desktop\Variables.txt"

Once it runs you may close the command prompt. There will now be file on your desktop called Variables.txt. Open it and find the entry near the bottom of the list entitled USERNAME. To the right of the = will be listed the name of your user's profile.

Share this post


Link to post
Share on other sites

Thanks..The problem with the full name was I didn't put a space between the first and last name.

The problem with the mouse was a really a problem with firefox updating themes ...( checkout mozilla troubleshooting extensions and themes).

I don't know why the cryptographic service doesn't work. Maybe this helps but before we even started the crypto service was and is still running(started) in the safe mode. Your move.

Share this post


Link to post
Share on other sites

In eldo's malware removal thread with AdvancedSetup, eldo mentioned,

Here is the error I get : Could not start the CryptSvc Service on local computer Error 1290: 0x50a

I Googled 1290: 0x50a and found a result stating,

Error 1290 - Error Code 0x50A

Windows Error Code 1290: 'ERROR_INCOMPATIBLE_SERVICE_SID_TYPE'

Description of Error

The service start failed since one or more services in the same process have an incompatible service SID type setting. A service with restricted service SID type can only coexist in the same process with other services with a restricted SID type. ...

In Post #6 of THIS thread, eldo's Crypto registry key output includes the following lines.

ServiceSidType REG_DWORD 0x1

RequiredPrivileges REG_MULTI_SZ SeChangeNotifyPrivilege\0SeCreateGlobalPrivilege\0SeImpersonatePrivilege\0\ 0

FailureActions REG_BINARY 80510100000000000000000003000000140000000100000060EA0000000000000000000000000000

00000000

It seems to me that those particular lines contain "restricted service SID type" information that my Google search result refers to (though I am not an expert).

I ran that batch file (from Post #5) in my Windows XP Home SP3 computer and found those lines do NOT exist in my computer and my computer functions normally (as far as I know). My output has a couple lines

I wonder whether or not eldo could simply (and safely) remove those parts of eldo's Crypto registry key without causing undesired consequences (and perhaps enabling eldo's CryptSvc service to start running properly again).

exile360 (and/or other experts), what are your thoughts about this?

Share this post


Link to post
Share on other sites

I got a tip from one of Experts who had a suggestion, but we need to confirm the root of the problem first. To do so you'll need to create another batch file as before and this time it will create a txt file called Services.txt on your desktop when you run it. Post it here in your next reply:

@echo off
reg query "HKLM\SYSTEM\CurrentControlSet\Services\CryptSvc" /s>"%userprofile%\desktop\Services.txt"
reg query "HKLM\SYSTEM\CurrentControlSet\Services\seclogon" /s>>"%userprofile%\desktop\Services.txt"
reg query "HKLM\SYSTEM\CurrentControlSet\Services\spooler" /s>>"%userprofile%\desktop\Services.txt"
start /max notepad "%userprofile%\desktop\Services.txt"

edit: @mailman: Thanks for the input, however I compared the SID and info to my own registry on a working system and that string is exactly the same.

Share this post


Link to post
Share on other sites

Ops, I was saying...

My output has a line that is NOT in eldo's output:

Group REG_SZ COM Infrastructure

in the first section immediately below "Type REG_DWORD 0x20"

and

Eldo has another line that is not in my output:

ServiceDllUnloadOnStop REG_DWORD 0x1

in the Parameters subkey.

(I'm sorry. I would normally put this in an "edit" but I do not see such a feature with this BBS software.)

Share this post


Link to post
Share on other sites

No problem <_< . You don't get the edit button until 50 posts. It's a policy they have in place due to past abuse by some users. Thanks for the clarification. Just for info and comparison, here's the output on my system (XP Home SP3):

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc
DependOnService REG_MULTI_SZ RpcSs\0\0
Description REG_SZ Provides three management services: Catalog Database Service, which confirms the signatures of Windows files; Protected Root Service, which adds and removes Trusted Root Certification Authority certificates from this computer; and Key Service, which helps enroll this computer for certificates. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start.
DisplayName REG_SZ Cryptographic Services
ErrorControl REG_DWORD 0x1
ImagePath REG_EXPAND_SZ %SystemRoot%\system32\svchost.exe -k netsvcs
ObjectName REG_SZ LocalSystem
Start REG_DWORD 0x2
Type REG_DWORD 0x20

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Parameters
ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\cryptsvc.dll
ServiceMain REG_SZ CryptServiceMain

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security
Security REG_BINARY 00000E0001

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Enum
0 REG_SZ Root\LEGACY_CRYPTSVC\0000
Count REG_DWORD 0x1
NextInstance REG_DWORD 0x1

I'm pretty sure I've got the fix now, but I need confirmation on all the entries that will be shown by the log from the batch file in my last post before I post it.

Share this post


Link to post
Share on other sites

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc

DependOnService REG_MULTI_SZ RpcSs\0\0

Description REG_SZ @%SystemRoot%\system32\cryptsvc.dll,-1002

DisplayName REG_SZ CryptSvc

ErrorControl REG_DWORD 0x1

ImagePath REG_EXPAND_SZ %SystemRoot%\system32\svchost.exe -k netsvcs

ObjectName REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x20

ServiceSidType REG_DWORD 0x1

RequiredPrivileges REG_MULTI_SZ SeChangeNotifyPrivilege\0SeCreateGlobalPrivilege\0SeImpersonatePrivilege\0\0

FailureActions REG_BINARY 80510100000000000000000003000000140000000100000060EA0000000000000000000000000000

00000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Parameters

ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\cryptsvc.dll

ServiceMain REG_SZ CryptServiceMain

ServiceDllUnloadOnStop REG_DWORD 0x1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security

Security REG_BINARY 00000E0001

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Enum

0 REG_SZ Root\LEGACY_CRYPTSVC\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon

Description REG_SZ @%SystemRoot%\system32\seclogon.dll,-7000

DisplayName REG_SZ Secondary Logon

ErrorControl REG_DWORD 0x0

ImagePath REG_EXPAND_SZ %SystemRoot%\System32\svchost.exe -k netsvcs

Objectname REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x120

RequiredPrivileges REG_MULTI_SZ SeTcbPrivilege\0SeRestorePrivilege\0SeBackupPrivilege\0SeAssignPrimaryTokenPrivilege\0SeIncreaseQuotaPrivilege\0SeImpersonatePrivilege\0\0

FailureActions REG_BINARY 805101000000000000000000030000001400000001000000C0D4010001000000E093040000000000

00000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Parameters

ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\seclogon.dll

ServiceMain REG_SZ SvcEntry_Seclogon

ServiceDllUnloadOnStop REG_DWORD 0x1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Security

Security REG_BINARY 010014807800000084000000140000003000000002001C000100000002801400FF010F0001010000

00000001000000000200480003000000000014008D01020001010000000000050B00000000001800

F

F010F000102000000000005200000002002000000001400FD0102000101000000000005120000000

1

0100000000000512000000010100000000000512000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Enum

0 REG_SZ Root\LEGACY_SECLOGON\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler

DependOnService REG_MULTI_SZ RPCSS\0\0

Description REG_SZ @%systemroot%\system32\spoolsv.exe,-2

DisplayName REG_SZ @%systemroot%\system32\spoolsv.exe,-1

ErrorControl REG_DWORD 0x1

FailureActions REG_BINARY 80510100000000000000000003000000E8470C000100000060EA00000100000060EA000000000000

00000000

Group REG_SZ SpoolerGroup

ImagePath REG_EXPAND_SZ %SystemRoot%\system32\spoolsv.exe

ObjectName REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x110

ServiceSidType REG_DWORD 0x1

RequiredPrivileges REG_MULTI_SZ SeTcbPrivilege\0SeImpersonatePrivilege\0SeAuditPrivilege\0SeChangeNotifyPrivilege\0SeLoadDriverPrivilege\0SeAssignPrimaryTokenPrivilege\0\0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Parameters

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Performance

Close REG_SZ PerfClose

Collect REG_SZ PerfCollect

Collect Timeout REG_DWORD 0x7d0

Library REG_SZ winspool.drv

Object List REG_SZ 1450

Open REG_SZ PerfOpen

Open Timeout REG_DWORD 0xfa0

WbemAdapFileSignature REG_BINARY BD83ABA61E8ACCC8D9FFB869F29418CE

WbemAdapFileTime REG_BINARY 00789C2F127AC401

WbemAdapFileSize REG_DWORD 0x23c00

WbemAdapStatus REG_DWORD 0x0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Security

Security REG_BINARY 010014807800000084000000140000003000000002001C000100000002801400FF010F0001010000

00000001000000000200480003000000000014008D01020001010000000000050B00000000001800

F

F010F000102000000000005200000002002000000001400FD0102000101000000000005120000000

1

0100000000000512000000010100000000000512000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Enum

0 REG_SZ Root\LEGACY_SPOOLER\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

Share this post


Link to post
Share on other sites

Thanks eldo. I've attached a .reg file to this post, please save it, unzip it, then double-click it to merge it with your registry. Once that's done, reboot and see if you're back to normal.

If there are errors let me know, and if it doesn't work let me know. Here's what the file contains if anyone is curious:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc]
"DependOnService"=hex(7):52,00,70,00,63,00,53,00,73,00,00,00,00,00
"Description"="Provides three management services: Catalog Database Service, which confirms the signatures of Windows files; Protected Root Service, which adds and removes Trusted Root Certification Authority certificates from this computer; and Key Service, which helps enroll this computer for certificates. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start."
"DisplayName"="Cryptographic Services"
"ErrorControl"=dword:00000001
"ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,00,00
"ObjectName"="LocalSystem"
"Start"=dword:00000002
"Type"=dword:00000020

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Parameters]
"ServiceDll"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
63,00,72,00,79,00,70,00,74,00,73,00,76,00,63,00,2e,00,64,00,6c,00,6c,00,00,\
00
"ServiceMain"="CryptServiceMain"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security]
"Security"=hex:00,00,0e,00,01

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Enum]
"0"="Root\\LEGACY_CRYPTSVC\\0000"
"Count"=dword:00000001
"NextInstance"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon]
"Description"="Enables starting processes under alternate credentials. If this service is stopped, this type of logon access will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start."
"DisplayName"="Secondary Logon"
"ErrorControl"=dword:00000000
"ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,00,00
"Objectname"="LocalSystem"
"Start"=dword:00000002
"Type"=dword:00000120

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Parameters]
"ServiceDll"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
73,00,65,00,63,00,6c,00,6f,00,67,00,6f,00,6e,00,2e,00,64,00,6c,00,6c,00,00,\
00
"ServiceMain"="SvcEntry_Seclogon"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Security]
"Security"=hex:01,00,14,80,78,00,00,00,84,00,00,00,14,00,00,00,30,00,00,00,02,\
00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
00,00,02,00,48,00,03,00,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,\
05,0b,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
20,02,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,01,\
01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Enum]
"0"="Root\\LEGACY_SECLOGON\\0000"
"Count"=dword:00000001
"NextInstance"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler]
"DependOnService"=hex(7):52,00,50,00,43,00,53,00,53,00,00,00,00,00
"Description"="Loads files to memory for later printing."
"DisplayName"="Print Spooler"
"ErrorControl"=dword:00000001
"FailureActions"=hex:80,51,01,00,00,00,00,00,00,00,00,00,03,00,00,00,e8,47,0c,\
00,01,00,00,00,60,ea,00,00,01,00,00,00,60,ea,00,00,00,00,00,00,00,00,00,00
"Group"="SpoolerGroup"
"ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
00,70,00,6f,00,6f,00,6c,00,73,00,76,00,2e,00,65,00,78,00,65,00,00,00
"ObjectName"="LocalSystem"
"Start"=dword:00000002
"Type"=dword:00000110

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler\Parameters]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Spooler\Performance]
"Close"="PerfClose"
"Collect"="PerfCollect"
"Collect Timeout"=dword:000007d0
"Library"="winspool.drv"
"Object List"="1450"
"Open"="PerfOpen"
"Open Timeout"=dword:00000fa0
"WbemAdapFileSignature"=hex:bd,83,ab,a6,1e,8a,cc,c8,d9,ff,b8,69,f2,94,18,ce
"WbemAdapFileTime"=hex:00,20,84,9f,5d,7a,c4,01
"WbemAdapFileSize"=dword:00023c00
"WbemAdapStatus"=dword:00000000

FixServices.zip

FixServices.zip

Share this post


Link to post
Share on other sites

Ok, would you mind running the batch file from Post #30 again and posting the results so I can verify that it changed the values?

Thanks <_< (and thanks for your patience and perseverance).

Share this post


Link to post
Share on other sites

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc

DependOnService REG_MULTI_SZ RpcSs\0\0

Description REG_SZ Provides three management services: Catalog Database Service, which confirms the signatures of Windows files; Protected Root Service, which adds and removes Trusted Root Certification Authority certificates from this computer; and Key Service, which helps enroll this computer for certificates. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start.

DisplayName REG_SZ Cryptographic Services

ErrorControl REG_DWORD 0x1

ImagePath REG_EXPAND_SZ %SystemRoot%\system32\svchost.exe -k netsvcs

ObjectName REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x20

ServiceSidType REG_DWORD 0x1

RequiredPrivileges REG_MULTI_SZ SeChangeNotifyPrivilege\0SeCreateGlobalPrivilege\0SeImpersonatePrivilege\0\0

FailureActions REG_BINARY 80510100000000000000000003000000140000000100000060EA0000000000000000000000000000

00000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Parameters

ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\cryptsvc.dll

ServiceMain REG_SZ CryptServiceMain

ServiceDllUnloadOnStop REG_DWORD 0x1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Security

Security REG_BINARY 00000E0001

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CryptSvc\Enum

0 REG_SZ Root\LEGACY_CRYPTSVC\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon

Description REG_SZ Enables starting processes under alternate credentials. If this service is stopped, this type of logon access will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start.

DisplayName REG_SZ Secondary Logon

ErrorControl REG_DWORD 0x0

ImagePath REG_EXPAND_SZ %SystemRoot%\System32\svchost.exe -k netsvcs

Objectname REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x120

RequiredPrivileges REG_MULTI_SZ SeTcbPrivilege\0SeRestorePrivilege\0SeBackupPrivilege\0SeAssignPrimaryTokenPrivilege\0SeIncreaseQuotaPrivilege\0SeImpersonatePrivilege\0\0

FailureActions REG_BINARY 805101000000000000000000030000001400000001000000C0D4010001000000E093040000000000

00000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Parameters

ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\seclogon.dll

ServiceMain REG_SZ SvcEntry_Seclogon

ServiceDllUnloadOnStop REG_DWORD 0x1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Security

Security REG_BINARY 010014807800000084000000140000003000000002001C000100000002801400FF010F0001010000

00000001000000000200480003000000000014008D01020001010000000000050B00000000001800

F

F010F000102000000000005200000002002000000001400FD0102000101000000000005120000000

1

0100000000000512000000010100000000000512000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seclogon\Enum

0 REG_SZ Root\LEGACY_SECLOGON\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler

DependOnService REG_MULTI_SZ RPCSS\0\0

Description REG_SZ Loads files to memory for later printing.

DisplayName REG_SZ Print Spooler

ErrorControl REG_DWORD 0x1

FailureActions REG_BINARY 80510100000000000000000003000000E8470C000100000060EA00000100000060EA000000000000

00000000

Group REG_SZ SpoolerGroup

ImagePath REG_EXPAND_SZ %SystemRoot%\system32\spoolsv.exe

ObjectName REG_SZ LocalSystem

Start REG_DWORD 0x2

Type REG_DWORD 0x110

ServiceSidType REG_DWORD 0x1

RequiredPrivileges REG_MULTI_SZ SeTcbPrivilege\0SeImpersonatePrivilege\0SeAuditPrivilege\0SeChangeNotifyPrivilege\0SeLoadDriverPrivilege\0SeAssignPrimaryTokenPrivilege\0\0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Parameters

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Performance

Close REG_SZ PerfClose

Collect REG_SZ PerfCollect

Collect Timeout REG_DWORD 0x7d0

Library REG_SZ winspool.drv

Object List REG_SZ 1450

Open REG_SZ PerfOpen

Open Timeout REG_DWORD 0xfa0

WbemAdapFileSignature REG_BINARY BD83ABA61E8ACCC8D9FFB869F29418CE

WbemAdapFileTime REG_BINARY 0020849F5D7AC401

WbemAdapFileSize REG_DWORD 0x23c00

WbemAdapStatus REG_DWORD 0x0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Security

Security REG_BINARY 010014807800000084000000140000003000000002001C000100000002801400FF010F0001010000

00000001000000000200480003000000000014008D01020001010000000000050B00000000001800

F

F010F000102000000000005200000002002000000001400FD0102000101000000000005120000000

1

0100000000000512000000010100000000000512000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\spooler\Enum

0 REG_SZ Root\LEGACY_SPOOLER\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

Share this post


Link to post
Share on other sites
edit: @mailman: Thanks for the input, however I compared the SID and info to my own registry on a working system and that string is exactly the same.

In case your current ideas do not pan out (and continuing with my original line of thought/research regarding eldo's specific CryptSvc "Error 1290: 0x50a" code), ...

The Cryptographic Services service apparently depends on the Remote Procedure Call (RPC) service (at least in my XP Home SP3 machine). Therefore, perhaps eldo's RPC service SID type setting information differs from eldo's CryptSvc service SID type setting information.

Share this post


Link to post
Share on other sites

Thanks mailman. I've considered that as well and will write a batch for him to verify so I can compare the SID's.

@eldo: Did you reboot after running the reg fix? If not, please do so then see if the service is running, thanks.

Share this post


Link to post
Share on other sites

Rebooted and tried to start manually...same error.

Share this post


Link to post
Share on other sites

Ok. Please run the following batch file and post back the results for me so I can check the SID as suggested by mailman:

@echo off
reg query "HKLM\SYSTEM\CurrentControlSet\Services\RpcSs" /s>"%userprofile%\desktop\RPCLog.txt"
start /max notepad "%userprofile%\desktop\RPCLog.txt"

Share this post


Link to post
Share on other sites

! REG.EXE VERSION 3.0

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs

Description REG_SZ Provides the endpoint mapper and other miscellaneous RPC services.

DisplayName REG_SZ Remote Procedure Call (RPC)

ErrorControl REG_DWORD 0x1

Group REG_SZ COM Infrastructure

ImagePath REG_EXPAND_SZ %SystemRoot%\system32\svchost -k rpcss

ObjectName REG_SZ NT Authority\NetworkService

Start REG_DWORD 0x2

Type REG_DWORD 0x10

FailureActions REG_BINARY 00000000000000000000000001000000000000000200000060EA0000

ServiceSidType REG_DWORD 0x1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters

ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\rpcss.dll

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security

Security REG_BINARY 01001480900000009C000000140000003000000002001C000100000002801400FF010F0001010000

00000001000000000200600004000000000014008D00020001010000000000050B00000000001800

F

F010F0001020000000000052000000020020000000014009D0000000101000000000005040000000

0

0018009D000000010200000000000520000000210200000101000000000005120000000101000000

0

0000512000000

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Enum

0 REG_SZ Root\LEGACY_RPCSS\0000

Count REG_DWORD 0x1

NextInstance REG_DWORD 0x1

Share this post


Link to post
Share on other sites

I guess the problem was I didn't have my fingers crossed last time. You're done what no one else has done and you should be promoted to expert. CHECKMATE! It Started :)

Share this post


Link to post
Share on other sites

Awesome :) .

I'm glad it's working now. To verify everything is working properly please click on Start > All Programs > Windows Update and check for Windows Updates. Since Windows Update depends on the Cryptographic Service, it won't work without it functioning properly.

Thanks again to you for your patience.

Share this post


Link to post
Share on other sites

The Microsoft Default Manager Icon appeared...no downloads yet.

Share this post


Link to post
Share on other sites

But no errors right? As long as it was able to check for updates you should be OK. Let me know if you have any more issues :) .

Share this post


Link to post
Share on other sites

Exile, I can confirm my computer with an identical problem is working now. Food tastes better, the sun is brighter, and you are a very good person.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.