2022-11-10T16:03:21.591+03:00 INFO (1B98-1FE4) <8164> [vmware-remotemks] Log for VMware View Client 2022-11-10T16:03:21.591+03:00 INFO (1B98-1FE4) <8164> [vmware-remotemks] hostname=DESKTOP-I877KSO 2022-11-10T16:03:21.575+03:00 INFO (1B98-11AC) <4524> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x1B98, buildtype=release, usethread=1, closeafterwrite=0, sessionId=5 2022-11-10T16:03:21.607+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x1B98, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:03:21.607+03:00 INFO (1B98-071C) [blast_hcSvcWrapIPC] Plugin 'blast_hcSvcWrapIPC - Blast HcSvc WrapIPC Plugin 64-bit' loaded, version=8.6.0 build-20078408, buildtype=release 2022-11-10T16:03:21.636+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Init(): BlastHcSvcWrapIPC & WrapIPCLock Init-ed 2022-11-10T16:03:22.834+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 0, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:03:22.837+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 0, rmksPid: 7064, transportType: 1 2022-11-10T16:03:22.837+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 2852, requestId: 0, rmksPid: 7064, transportType: 1 2022-11-10T16:03:26.571+03:00 INFO (1B98-0130) <304> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x1B98, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:03:26.681+03:00 INFO (1B98-1E6C) <7788> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x1B98, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:03:27.183+03:00 ERROR (1B98-1E6C) <7788> [vmware-remotemks] HccChannelPlugin::ChannelAddRef: No shared memory channel. Horizon client service may be down. 2022-11-10T16:03:27.687+03:00 ERROR (1B98-1E6C) <7788> [vmware-remotemks] HccChannelPlugin::ChannelAddRef: No shared memory channel. Horizon client service may be down. 2022-11-10T16:03:27.687+03:00 ERROR (1B98-1E6C) <7788> [vmware-remotemks] HccChannelPlugin::GetControllerMessageQueues: ChannelAddRef failed! 2022-11-10T16:03:28.089+03:00 INFO (1B98-23E4) <9188> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x1B98, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:03:28.091+03:00 INFO (1B98-23E4) <9188> [vmware-remotemks] MfwConnector::InitAutoChannel(): Started the message framework. 2022-11-10T16:06:38.823+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 2, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:06:38.827+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 2, rmksPid: 7064, transportType: 1 2022-11-10T16:06:38.827+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 7040, requestId: 2, rmksPid: 7064, transportType: 1 2022-11-10T16:06:59.886+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 3, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 63540, remoteIP: localhost, dscpValue : -1 2022-11-10T16:06:59.892+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 3, rmksPid: 7064, transportType: 1 2022-11-10T16:06:59.893+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 7044, requestId: 3, rmksPid: 7064, transportType: 1 2022-11-10T16:07:06.937+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 4, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:07:06.941+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 4, rmksPid: 7064, transportType: 1 2022-11-10T16:07:06.941+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 7044, requestId: 4, rmksPid: 7064, transportType: 1 2022-11-10T16:07:27.973+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 5, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 63540, remoteIP: localhost, dscpValue : -1 2022-11-10T16:07:27.976+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 5, rmksPid: 7064, transportType: 1 2022-11-10T16:07:27.976+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6516, requestId: 5, rmksPid: 7064, transportType: 1 2022-11-10T16:07:39.012+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 6, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:07:39.015+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 6, rmksPid: 7064, transportType: 1 2022-11-10T16:07:39.015+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 7280, requestId: 6, rmksPid: 7064, transportType: 1 2022-11-10T16:08:00.062+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 7, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 63540, remoteIP: localhost, dscpValue : -1 2022-11-10T16:08:00.066+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 7, rmksPid: 7064, transportType: 1 2022-11-10T16:08:00.066+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5212, requestId: 7, rmksPid: 7064, transportType: 1 2022-11-10T16:08:11.155+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 8, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:08:11.159+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 8, rmksPid: 7064, transportType: 1 2022-11-10T16:08:11.159+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5208, requestId: 8, rmksPid: 7064, transportType: 1 2022-11-10T16:08:32.199+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 9, rmksPid: 7064, transportType: 1, addrFamily: 2, remotePort: 63540, remoteIP: localhost, dscpValue : -1 2022-11-10T16:08:32.203+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 9, rmksPid: 7064, transportType: 1 2022-11-10T16:08:32.203+03:00 INFO (1B98-2AA4) <10916> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5308, requestId: 9, rmksPid: 7064, transportType: 1 2022-11-10T16:08:36.913+03:00 INFO (1B98-11AC) <4524> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Uninit(): BlastHcSvcWrapIPC Uninit-ed 2022-11-10T16:08:37.958+03:00 INFO (1B98-11AC) <4524> [vmware-remotemks] MfwConnector::ShutdownMFW(): Stopped the message framework. 2022-11-10T16:10:12.374+03:00 INFO (30B4-323C) <12860> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x30B4, buildtype=release, usethread=1, closeafterwrite=0, sessionId=5 2022-11-10T16:10:12.402+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x30B4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:10:12.402+03:00 INFO (30B4-3584) [blast_hcSvcWrapIPC] Plugin 'blast_hcSvcWrapIPC - Blast HcSvc WrapIPC Plugin 64-bit' loaded, version=8.6.0 build-20078408, buildtype=release 2022-11-10T16:10:12.403+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Init(): BlastHcSvcWrapIPC & WrapIPCLock Init-ed 2022-11-10T16:10:13.449+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 0, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T16:10:13.452+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 0, rmksPid: 12468, transportType: 1 2022-11-10T16:10:13.452+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 2340, requestId: 0, rmksPid: 12468, transportType: 1 2022-11-10T16:10:15.665+03:00 INFO (30B4-0DE0) <3552> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x30B4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:10:15.670+03:00 INFO (30B4-19A8) <6568> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x30B4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:10:15.698+03:00 INFO (30B4-3694) <13972> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x30B4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T16:10:15.699+03:00 INFO (30B4-3694) <13972> [vmware-remotemks] MfwConnector::InitAutoChannel(): Started the message framework. 2022-11-10T16:10:16.170+03:00 ERROR (30B4-19A8) <6568> [vmware-remotemks] HccChannelPlugin::ChannelAddRef: No shared memory channel. Horizon client service may be down. 2022-11-10T18:05:53.087+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 2, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T18:05:53.097+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 2, rmksPid: 12468, transportType: 1 2022-11-10T18:05:53.097+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5184, requestId: 2, rmksPid: 12468, transportType: 1 2022-11-10T18:06:14.134+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 3, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 61756, remoteIP: localhost, dscpValue : -1 2022-11-10T18:06:14.136+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 3, rmksPid: 12468, transportType: 1 2022-11-10T18:06:14.136+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6380, requestId: 3, rmksPid: 12468, transportType: 1 2022-11-10T18:06:21.181+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 4, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T18:06:21.185+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 4, rmksPid: 12468, transportType: 1 2022-11-10T18:06:21.185+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5184, requestId: 4, rmksPid: 12468, transportType: 1 2022-11-10T18:06:42.229+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 5, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 61756, remoteIP: localhost, dscpValue : -1 2022-11-10T18:06:42.236+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 5, rmksPid: 12468, transportType: 1 2022-11-10T18:06:42.236+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6384, requestId: 5, rmksPid: 12468, transportType: 1 2022-11-10T18:06:53.276+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 6, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T18:06:53.283+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 6, rmksPid: 12468, transportType: 1 2022-11-10T18:06:53.283+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 5224, requestId: 6, rmksPid: 12468, transportType: 1 2022-11-10T18:07:14.350+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 7, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 61756, remoteIP: localhost, dscpValue : -1 2022-11-10T18:07:14.358+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 7, rmksPid: 12468, transportType: 1 2022-11-10T18:07:14.358+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6408, requestId: 7, rmksPid: 12468, transportType: 1 2022-11-10T18:07:25.399+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 8, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T18:07:25.407+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 8, rmksPid: 12468, transportType: 1 2022-11-10T18:07:25.407+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6164, requestId: 8, rmksPid: 12468, transportType: 1 2022-11-10T18:07:46.462+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 9, rmksPid: 12468, transportType: 1, addrFamily: 2, remotePort: 61756, remoteIP: localhost, dscpValue : -1 2022-11-10T18:07:46.464+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 9, rmksPid: 12468, transportType: 1 2022-11-10T18:07:46.465+03:00 INFO (30B4-28C4) <10436> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 6820, requestId: 9, rmksPid: 12468, transportType: 1 2022-11-10T18:07:51.195+03:00 INFO (30B4-323C) <12860> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Uninit(): BlastHcSvcWrapIPC Uninit-ed 2022-11-10T18:07:52.250+03:00 INFO (30B4-323C) <12860> [vmware-remotemks] MfwConnector::ShutdownMFW(): Stopped the message framework. 2022-11-10T18:12:49.838+03:00 INFO (16C4-0EB4) <3764> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x16C4, buildtype=release, usethread=1, closeafterwrite=0, sessionId=5 2022-11-10T18:12:49.858+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x16C4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T18:12:49.859+03:00 INFO (16C4-32E0) [blast_hcSvcWrapIPC] Plugin 'blast_hcSvcWrapIPC - Blast HcSvc WrapIPC Plugin 64-bit' loaded, version=8.6.0 build-20078408, buildtype=release 2022-11-10T18:12:49.860+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Init(): BlastHcSvcWrapIPC & WrapIPCLock Init-ed 2022-11-10T18:12:50.933+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): requestId: 0, rmksPid: 5828, transportType: 1, addrFamily: 2, remotePort: 443, remoteIP: 172.16.254.131, dscpValue : -1 2022-11-10T18:12:50.937+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): MFW SendMsg() done and Duplicated SocketFd Received, requestId: 0, rmksPid: 5828, transportType: 1 2022-11-10T18:12:50.937+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_SendSetDscpReq(): WSASocket() Success, dupedFd: 2172, requestId: 0, rmksPid: 5828, transportType: 1 2022-11-10T18:12:53.506+03:00 INFO (16C4-31AC) <12716> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x16C4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T18:12:53.510+03:00 INFO (16C4-15A4) <5540> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x16C4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T18:12:53.618+03:00 INFO (16C4-0E04) <3588> [vmware-remotemks] Program 'vmware-remotemks - VMware Horizon View Client 64-bit' started, version=8.6.0 build-20094380, pid=0x16C4, buildtype=release, usethread=0, closeafterwrite=0, sessionId=5 2022-11-10T18:12:53.620+03:00 INFO (16C4-0E04) <3588> [vmware-remotemks] MfwConnector::InitAutoChannel(): Started the message framework. 2022-11-10T18:12:54.011+03:00 ERROR (16C4-15A4) <5540> [vmware-remotemks] HccChannelPlugin::ChannelAddRef: No shared memory channel. Horizon client service may be down. 2022-11-10T19:32:54.130+03:00 INFO (16C4-0EB4) <3764> [blast_hcSvcWrapIPC] BlastHcSvcWrapIPC_Uninit(): BlastHcSvcWrapIPC Uninit-ed 2022-11-10T19:32:55.188+03:00 INFO (16C4-0EB4) <3764> [vmware-remotemks] MfwConnector::ShutdownMFW(): Stopped the message framework.