| | | |
|
| | DLL File | Version | Description
|
| | abovelockapphost.dll | 6.2.10240.16384 | AboveLockAppHost
|
| | accessibilitycpl.dll | 6.2.10240.16384 | Ease of access control panel
|
| | accountscontrolinternal.dll | 6.2.10240.16384 | Accounts Control Broker Objects
|
| | acctres.dll | 6.2.10240.16384 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 6.2.10240.16384 | Access Control List Editor
|
| | aclui.dll | 6.2.10240.16384 | Security Descriptor Editor
|
| | acppage.dll | 6.2.10240.16384 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 6.2.10240.16427 | Security and Maintenance
|
| | actioncentercpl.dll | 6.2.10240.16384 | Security and Maintenance Control Panel
|
| | activationclient.dll | 6.2.10240.16384 | Activation Client
|
| | activeds.dll | 6.2.10240.16384 | ADs Router Layer DLL
|
| | actxprxy.dll | 6.2.10240.16390 | ActiveX Interface Marshaling Library
|
| | addressparser.dll | 6.2.10240.16384 | ADDRESSPARSER
|
| | admtmpl.dll | 6.2.10240.16384 | Administrative Templates Extension
|
| | adprovider.dll | 6.2.10240.16384 | adprovider DLL
|
| | adrclient.dll | 6.2.10240.16384 | Microsoft® Access Denied Remediation Client
|
| | adsldp.dll | 6.2.10240.16384 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 6.2.10240.16384 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 6.2.10240.16384 | ADs LDAP Provider DLL
|
| | adsnt.dll | 6.2.10240.16384 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 6.2.10240.16384 | Security Audit Schema DLL
|
| | advapi32.dll | 6.2.10240.16384 | Advanced Windows 32 Base API
|
| | advapi32res.dll | 6.2.10240.16384 | Advanced Windows 32 Base API
|
| | advpack.dll | 11.0.10240.16384 | ADVPACK
|
| | aeevts.dll | 6.2.10240.16384 | Application Experience Event Resources
|
| | amsi.dll | 4.8.10240.16384 | Anti-Malware Scan Interface
|
| | amstream.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | apds.dll | 6.2.10240.16384 | Microsoft® Help Data Services Module
|
| | appcapture.dll | 6.2.10240.16384 | Windows Runtime AppCapture DLL
|
| | appcontracts.dll | 6.2.10240.16387 | Windows AppContracts API Server
|
| | apphelp.dll | 6.2.10240.16384 | Application Compatibility Client Library
|
| | apphlpdm.dll | 6.2.10240.16384 | Application Compatibility Help Module
|
| | appidapi.dll | 6.2.10240.16384 | Application Identity APIs Dll
|
| | appidpolicyengineapi.dll | 6.2.10240.16384 | AppId Policy Engine API Module
|
| | applockercsp.dll | 6.2.10240.16384 | AppLockerCSP
|
| | appmgmts.dll | 6.2.10240.16384 | Software installation Service
|
| | appmgr.dll | 6.2.10240.16384 | Software Installation Snapin Extenstion
|
| | appointmentactivation.dll | 6.2.10240.16384 | DLL for AppointmentActivation
|
| | appointmentapis.dll | 6.2.10240.16384 | DLL for CalendarRT
|
| | apprepapi.dll | 6.2.10240.16384 | Application Reputation APIs Dll
|
| | apprepsync.dll | 6.2.10240.16384 | AppRepSync Task
|
| | appxalluserstore.dll | 6.2.10240.16389 | AppX All User Store DLL
|
| | appxapplicabilityengine.dll | 6.2.10240.16384 | AppX Applicability Engine
|
| | appxdeploymentclient.dll | 6.2.10240.16445 | AppX Deployment Client DLL
|
| | appxpackaging.dll | 6.2.10240.16384 | Native Code Appx Packaging Library
|
| | appxsip.dll | 6.2.10240.16384 | Appx Subject Interface Package
|
| | asferror.dll | 12.0.10240.16384 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.6.79.0 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 6.2.10240.16384 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.325 | ATL Module for Windows
|
| | atl110.dll | 11.0.60610.1 | ATL Module for Windows
|
| | atlthunk.dll | 6.2.10240.16384 | atlthunk.dll
|
| | atmfd.dll | 5.1.2.246 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.246 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 6.2.10240.16384 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 6.2.10240.16412 | Audio Engine
|
| | audiokse.dll | 6.2.10240.16384 | Audio Ks Endpoint
|
| | audioses.dll | 6.2.10240.16412 | Audio Session
|
| | auditnativesnapin.dll | 6.2.10240.16384 | Audit Policy Group Policy Editor Extension
|
| | auditpolicygpinterop.dll | 6.2.10240.16384 | Audit Policy GP Module
|
| | auditpolmsg.dll | 6.2.10240.16384 | Audit Policy MMC SnapIn Messages
|
| | authbroker.dll | 6.2.10240.16384 | Web Authentication WinRT API
|
| | authbrokerui.dll | 6.2.10240.16384 | AuthBroker UI
|
| | authext.dll | 6.2.10240.16384 | Authentication Extensions
|
| | authfwcfg.dll | 6.2.10240.16384 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 6.2.10240.16384 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 6.2.10240.16384 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 6.2.10240.16384 | Wizard Framework
|
| | authui.dll | 6.2.10240.16485 | Windows Authentication UI
|
| | authz.dll | 6.2.10240.16384 | Authorization Framework
|
| | autoplay.dll | 6.2.10240.16384 | AutoPlay Control Panel
|
| | avicap32.dll | 6.2.10240.16384 | AVI Capture window class
|
| | avifil32.dll | 6.2.10240.16384 | Microsoft AVI File support library
|
| | avrt.dll | 6.2.10240.16384 | Multimedia Realtime Runtime
|
| | azroles.dll | 6.2.10240.16384 | azroles Module
|
| | azroleui.dll | 6.2.10240.16384 | Authorization Manager
|
| | azsqlext.dll | 6.2.10240.16384 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | azuresettingsyncprovider.dll | 6.2.10240.16384 | Azure Setting Sync Provider
|
| | backgroundmediapolicy.dll | 6.2.10240.16384 | <d> Background Media Policy DLL
|
| | basecsp.dll | 6.2.10240.16384 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 6.2.10240.16384 | Battery Meter Helper DLL
|
| | bcastdvr.proxy.dll | 6.2.10240.16384 | Broadcast DVR Proxy
|
| | bcd.dll | 6.2.10240.16393 | BCD DLL
|
| | bcp47langs.dll | 6.2.10240.16384 | BCP47 Language Classes
|
| | bcrypt.dll | 6.2.10240.16384 | Windows Cryptographic Primitives Library
|
| | bcryptprimitives.dll | 6.2.10240.16384 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 6.2.10240.16384 | Bidispl DLL
|
| | bingmaps.dll | 6.2.10240.16392 | Bing Map Control
|
| | bingonlineservices.dll | 6.2.10240.16384 | Bing online services
|
| | biocredprov.dll | 6.2.10240.16384 | WinBio Credential Provider
|
| | bitsperf.dll | 7.8.10240.16384 | Perfmon Counter Access
|
| | bitsproxy.dll | 7.8.10240.16384 | Background Intelligent Transfer Service Proxy
|
| | biwinrt.dll | 6.2.10240.16384 | Windows Background Broker Infrastructure
|
| | blackbox.dll | 11.0.10240.16384 | BlackBox DLL
|
| | bluetoothapis.dll | 6.2.10240.16384 | Bluetooth Usermode Api host
|
| | bootvid.dll | 6.2.10240.16384 | VGA Boot Driver
|
| | browcli.dll | 6.2.10240.16384 | Browser Service Client DLL
|
| | browsersettingsync.dll | 6.2.10240.16384 | Browser Setting Synchronization
|
| | browseui.dll | 6.2.10240.16384 | Shell Browser UI Library
|
| | btpanui.dll | 6.2.10240.16384 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | c_g18030.dll | 6.2.10240.16384 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_gsm7.dll | 6.2.10240.16384 | GSM 7bit Code Page Translation DLL for SMS
|
| | c_is2022.dll | 6.2.10240.16384 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 6.2.10240.16384 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 6.2.10240.16384 | Microsoft® Cabinet File API
|
| | cabview.dll | 6.2.10240.16384 | Cabinet File Viewer Shell Extension
|
| | callbuttons.dll | 6.2.10240.16384 | Windows Runtime CallButtonsServer DLL
|
| | callbuttons.proxystub.dll | 6.2.10240.16384 | Windows Runtime CallButtonsServer ProxyStub DLL
|
| | callhistoryclient.dll | 6.2.10240.16384 | Client DLL for accessing CallHistory information
|
| | cameracaptureui.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | capiprovider.dll | 6.2.10240.16384 | capiprovider DLL
|
| | capisp.dll | 6.2.10240.16384 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 6.2.10240.16384 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.10240.16384 | Microsoft CDO for Windows Library
|
| | cdp.dll | 6.2.10240.16384 | Microsoft (R) CDP Client API
|
| | cemapi.dll | 6.2.10240.16384 | CEMAPI
|
| | certca.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services CA
|
| | certcli.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 6.2.10240.16384 | Cert Credential Provider
|
| | certenc.dll | 6.2.10240.16384 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 6.2.10240.16384 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 6.2.10240.16384 | Certificates snap-in
|
| | certpoleng.dll | 6.2.10240.16384 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.10240.16384 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 6.2.10240.16384 | Configuration Backend Interface
|
| | cfgmgr32.dll | 6.2.10240.16384 | Configuration Manager DLL
|
| | cfmifs.dll | 6.2.10240.16384 | FmIfs Engine
|
| | cfmifsproxy.dll | 6.2.10240.16384 | Microsoft® FmIfs Proxy Library
|
| | chakra.dll | 11.0.10240.16431 | Microsoft ® JScript
|
| | chakradiag.dll | 11.0.10240.16384 | Microsoft ® JScript Diagnostics
|
| | chartv.dll | 6.2.10240.16384 | Chart View
|
| | chatapis.dll | 6.2.10240.16384 | DLL for ChatRT
|
| | chxreadingstringime.dll | 6.2.10240.16384 | CHxReadingStringIME
|
| | cic.dll | 6.2.10240.16384 | CIC - MMC controls for Taskpad
|
| | clb.dll | 6.2.10240.16384 | Column List Box
|
| | clbcatq.dll | 2001.12.10941.16384 | COM+ Configuration Catalog
|
| | clfsw32.dll | 6.2.10240.16384 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 6.2.10240.16384 | SQL Client Configuration Utility DLL
|
| | clipboardserver.dll | 6.2.10240.16384 | Modern Clipboard API Server
|
| | clipc.dll | 6.2.10240.16384 | Client Licensing Platform Client
|
| | clrhost.dll | 6.2.10240.16384 | In Proc server for managed servers in the Windows Runtime
|
| | clusapi.dll | 6.2.10240.16384 | Cluster API Library
|
| | cmcfg32.dll | 7.2.10240.16384 | Microsoft Connection Manager Configuration Dll
|
| | cmdext.dll | 6.2.10240.16384 | cmd.exe Extension DLL
|
| | cmdial32.dll | 7.2.10240.16384 | Microsoft Connection Manager
|
| | cmifw.dll | 6.2.10240.16384 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 6.2.10240.16384 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.10240.16384 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.10240.16384 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.10240.16384 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.10240.16384 | Microsoft Connection Manager Utility Lib
|
| | cngcredui.dll | 6.2.10240.16384 | Microsoft CNG CredUI Provider
|
| | cngprovider.dll | 6.2.10240.16384 | cngprovider DLL
|
| | cnvfat.dll | 6.2.10240.16384 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.10941.16384 | COM+
|
| | colorcnv.dll | 6.2.10240.16384 | Windows Media Color Conversion
|
| | colorui.dll | 6.2.10240.16384 | Microsoft Color Control Panel
|
| | combase.dll | 6.2.10240.16384 | Microsoft COM for Windows
|
| | comcat.dll | 6.2.10240.16384 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.10240.16384 | User Experience Controls Library
|
| | comdlg32.dll | 6.2.10240.16405 | Common Dialogs DLL
|
| | coml2.dll | 6.2.10240.16384 | Microsoft COM for Windows
|
| | commstypehelperutil_ca.dll | 6.2.10240.16384 | Comms Type Helper Util
|
| | compobj.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | comppkgsup.dll | 12.0.10240.16384 | Component Package Support DLL
|
| | compstui.dll | 6.2.10240.16384 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.10941.16384 | COM+
|
| | comres.dll | 2001.12.10941.16384 | COM+ Resources
|
| | comsnap.dll | 2001.12.10941.16384 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.10941.16384 | COM+ Services
|
| | comuid.dll | 2001.12.10941.16384 | COM+ Explorer UI
|
| | configureexpandedstorage.dll | 6.2.10240.16384 | ConfigureExpandedStorage
|
| | connect.dll | 6.2.10240.16384 | Get Connected Wizards
|
| | connectedaccountstate.dll | 6.2.10240.16384 | ConnectedAccountState.dll
|
| | console.dll | 6.2.10240.16384 | Control Panel Console Applet
|
| | contactactivation.dll | 6.2.10240.16384 | DLL for ContactActivation
|
| | contactapis.dll | 6.2.10240.16397 | DLL for ContactsRT
|
| | coremessaging.dll | 6.2.10240.16397 | Microsoft CoreMessaging Dll
|
| | coremmres.dll | 6.2.10240.16384 | General Core Multimedia Resources
|
| | coreuicomponents.dll | |
|
| | cortana.persona.dll | 6.2.10240.16384 | Cortana.Persona
|
| | cortanamapihelper.dll | 6.2.10240.16384 | CortanaMapiHelper
|
| | cortanamapihelper.proxystub.dll | 6.2.10240.16384 | CortanaMapiHelper.ProxyStub
|
| | cpfilters.dll | 6.2.10240.16384 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credentialmigrationhandler.dll | 6.2.10240.16384 | Credential Migration Handler
|
| | credprovdatamodel.dll | 6.2.10240.16412 | Cred Prov Data Model
|
| | credprovhost.dll | 6.2.10240.16384 | Credential Provider Framework Host
|
| | credprovs.dll | 6.2.10240.16384 | Credential Providers
|
| | credssp.dll | 6.2.10240.16384 | Credential Delegation Security Package
|
| | credui.dll | 6.2.10240.16384 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 6.2.10240.16384 | Crypto API32
|
| | cryptbase.dll | 6.2.10240.16384 | Base cryptographic API DLL
|
| | cryptdlg.dll | 6.2.10240.16384 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 6.2.10240.16384 | Cryptography Manager
|
| | cryptext.dll | 6.2.10240.16384 | Crypto Shell Extensions
|
| | cryptnet.dll | 6.2.10240.16384 | Crypto Network Related API
|
| | cryptngc.dll | 6.2.10240.16384 | Microsoft Passport API
|
| | cryptowinrt.dll | 6.2.10240.16384 | Crypto WinRT Library
|
| | cryptsp.dll | 6.2.10240.16384 | Cryptographic Service Provider API
|
| | crypttpmeksvc.dll | 6.2.10240.16384 | Cryptographic TPM Endorsement Key Services
|
| | cryptui.dll | 6.2.10240.16384 | Microsoft Trust UI Provider
|
| | cryptuiwizard.dll | 6.2.10240.16384 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 6.2.10240.16384 | XML DigSig API
|
| | cscapi.dll | 6.2.10240.16384 | Offline Files Win32 API
|
| | cscdll.dll | 6.2.10240.16384 | Offline Files Temporary Shim
|
| | cscobj.dll | 6.2.10240.16384 | In-proc COM object used by clients of CSC API
|
| | csver.dll | 9.3.0.1021 | CSVer
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 6.2.10240.16384 | Microsoft D2D Library
|
| | d3d10.dll | 6.2.10240.16384 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 6.2.10240.16384 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 6.2.10240.16384 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 6.2.10240.16384 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 6.2.10240.16384 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 6.2.10240.16384 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 6.2.10240.16384 | Direct3D 11 Runtime
|
| | d3d12.dll | 6.2.10240.16384 | Direct3D 12 Runtime
|
| | d3d8.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3d8thk.dll | 6.2.10240.16384 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 6.2.10240.16412 | Direct3D 9 Runtime
|
| | d3dcompiler_47.dll | 6.2.10240.16384 | Direct3D HLSL Compiler
|
| | d3dim.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dim700.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dramp.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dxof.dll | 6.2.10240.16384 | DirectX Files DLL
|
| | dabapi.dll | 6.2.10240.16384 | Desktop Activity Broker API
|
| | dafcdp.dll | 6.2.10240.16384 | DAF CDP Provider
|
| | dafprintprovider.dll | 6.2.10240.16384 | DAF Print Provider DLL
|
| | daotpcredentialprovider.dll | 6.2.10240.16384 | DirectAccess One-Time Password Credential Provider
|
| | dataclen.dll | 6.2.10240.16384 | Disk Space Cleaner for Windows
|
| | dataexchange.dll | 6.2.10240.16384 | Data exchange
|
| | davclnt.dll | 6.2.10240.16384 | Web DAV Client DLL
|
| | davhlpr.dll | 6.2.10240.16384 | DAV Helper DLL
|
| | dbgcore.dll | 6.2.10240.16384 | Windows Core Debugging Helpers
|
| | dbgeng.dll | 6.2.10240.16384 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 6.2.10240.16384 | Windows Image Helper
|
| | dbgmodel.dll | 6.2.10240.16384 | Windows Debugger Data Model
|
| | dbnetlib.dll | 6.2.10240.16384 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 6.2.10240.16384 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 6.2.10240.16384 | DCI Manager
|
| | dcomp.dll | 6.2.10240.16384 | Microsoft DirectComposition Library
|
| | ddaclsys.dll | 6.2.10240.16384 | SysPrep module for Resetting Data Drive ACL
|
| | ddoiproxy.dll | 6.2.10240.16384 | DDOI Interface Proxy
|
| | ddores.dll | 6.2.10240.16384 | Device Category information and resources
|
| | ddraw.dll | 6.2.10240.16384 | Microsoft DirectDraw
|
| | ddrawex.dll | 6.2.10240.16384 | Direct Draw Ex
|
| | defaultdevicemanager.dll | 6.2.10240.16384 | Default Device Manager
|
| | defaultprinterprovider.dll | 6.2.10240.16384 | Microsoft Windows Default Printer Provider
|
| | delegatorprovider.dll | 6.2.10240.16384 | WMI PassThru Provider for Storage Management
|
| | deskadp.dll | 6.2.10240.16384 | Advanced display adapter properties
|
| | deskmon.dll | 6.2.10240.16384 | Advanced display monitor properties
|
| | devdispitemprovider.dll | 6.2.10240.16384 | DeviceItem inproc devquery subsystem
|
| | devenum.dll | 6.2.10240.16384 | Device enumeration.
|
| | deviceaccess.dll | 6.2.10240.16384 | Device Broker And Policy COM Server
|
| | deviceassociation.dll | 6.2.10240.16384 | Device Association Client DLL
|
| | devicecenter.dll | 6.2.10240.16384 | Device Center
|
| | devicedisplaystatusmanager.dll | 6.2.10240.16384 | Device Display Status Manager
|
| | devicepairing.dll | 6.2.10240.16384 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 6.2.10240.16384 | Device Pairing Folder
|
| | devicepairingproxy.dll | 6.2.10240.16384 | Device Pairing Proxy Dll
|
| | devicesetupstatusprovider.dll | 6.2.10240.16384 | Device Setup Status Provider Dll
|
| | deviceuxres.dll | 6.2.10240.16384 | Windows Device User Experience Resource File
|
| | devmgr.dll | 6.2.10240.16384 | Device Manager MMC Snapin
|
| | devobj.dll | 6.2.10240.16384 | Device Information Set DLL
|
| | devrtl.dll | 6.2.10240.16384 | Device Management Run Time Library
|
| | dfscli.dll | 6.2.10240.16384 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 6.2.10240.16384 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 6.2.10240.16384 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 6.2.10240.16384 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 6.2.10240.16384 | DHCP Client Service
|
| | dhcpcore6.dll | 6.2.10240.16384 | DHCPv6 Client
|
| | dhcpcsvc.dll | 6.2.10240.16384 | DHCP Client Service
|
| | dhcpcsvc6.dll | 6.2.10240.16384 | DHCPv6 Client
|
| | dhcpsapi.dll | 6.2.10240.16384 | DHCP Server API Stub DLL
|
| | dialclient.dll | 12.0.10240.16384 | DIAL DLL
|
| | dictationmanager.dll | 6.2.0.1 | Dictation Manager
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 6.2.10240.16384 | DIMS Job DLL
|
| | dimsroam.dll | 6.2.10240.16384 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 6.2.10240.16384 | Microsoft DirectInput
|
| | dinput8.dll | 6.2.10240.16384 | Microsoft DirectInput
|
| | directdb.dll | 6.2.10240.16384 | Microsoft Direct Database API
|
| | directmanipulation.dll | 6.2.10240.16431 | Microsoft Direct Manipulation Component
|
| | dismapi.dll | 6.2.10240.16384 | DISM API Framework
|
| | dispex.dll | 5.812.10240.16384 | Microsoft ® DispEx
|
| | display.dll | 6.2.10240.16384 | Display Control Panel
|
| | displaymanager.dll | 6.2.10240.16386 | DisplayManager
|
| | dlnashext.dll | 12.0.10240.16384 | DLNA Namespace DLL
|
| | dmband.dll | 6.2.10240.16384 | Microsoft DirectMusic Band
|
| | dmcmnutils.dll | 6.2.10240.16384 | dmcmnutils
|
| | dmcompos.dll | 6.2.10240.16384 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 6.2.10240.16384 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 6.2.10240.16384 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 6.2.10240.16384 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 6.2.10240.16384 | Disk Management Snap-in Resources
|
| | dmime.dll | 6.2.10240.16384 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 6.2.10240.16384 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 6.2.10240.16384 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 6.2.10240.16384 | TreeView OCX
|
| | dmscript.dll | 6.2.10240.16384 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 6.2.10240.16384 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 6.2.10240.16384 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 6.2.10240.16384 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 6.2.10240.16384 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 6.2.10240.16384 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 6.2.10240.16384 | DNS Client API DLL
|
| | dnscmmc.dll | 6.2.10240.16384 | DNS Client MMC Snap-in DLL
|
| | dnssd.dll | 1.0.6.2 | Bonjour Client Library
|
| | docprop.dll | 6.2.10240.16384 | OLE DocFile Property Page
|
| | dolbydecmft.dll | 6.2.10240.16384 | Media Foundation Dolby Digital Decoders
|
| | dot3api.dll | 6.2.10240.16384 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 6.2.10240.16384 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 6.2.10240.16384 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 6.2.10240.16384 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 6.2.10240.16384 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 6.2.10240.16384 | Dot3 Helper Class
|
| | dot3msm.dll | 6.2.10240.16384 | 802.3 Media Specific Module
|
| | dot3ui.dll | 6.2.10240.16384 | 802.3 Advanced UI
|
| | dpapi.dll | 6.2.10240.16384 | Data Protection API
|
| | dpapiprovider.dll | 6.2.10240.16384 | dpapiprovider DLL
|
| | dplayx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpmodemx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnaddr.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnathlp.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnet.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnhpast.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnhupnp.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnlobby.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpwsockx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpx.dll | 6.2.10240.16384 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.10240.16384 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.10100.0 | DRMv2 Client DLL
|
| | drprov.dll | 6.2.10240.16384 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 6.2.10240.16384 | Distributed Routing Table
|
| | drtprov.dll | 6.2.10240.16384 | Distributed Routing Table Providers
|
| | drttransport.dll | 6.2.10240.16384 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 6.2.10240.16384 | Driver Store API
|
| | dsauth.dll | 6.2.10240.16384 | DS Authorization for Services
|
| | dsccoreconfprov.dll | 6.2.9200.16384 | DSC
|
| | dsclient.dll | 6.2.10240.16384 | Data Sharing Service Client DLL
|
| | dsdmo.dll | 6.2.10240.16384 | DirectSound Effects
|
| | dskquota.dll | 6.2.10240.16384 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 6.2.10240.16384 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 6.2.10240.16384 | DirectSound
|
| | dsparse.dll | 6.2.10240.16384 | Active Directory Domain Services API
|
| | dsprop.dll | 6.2.10240.16384 | Windows Active Directory Property Pages
|
| | dsquery.dll | 6.2.10240.16384 | Directory Service Find
|
| | dsreg.dll | 6.2.10240.16384 | AD/AAD User Device Registration
|
| | dsrole.dll | 6.2.10240.16384 | DS Setup Client DLL
|
| | dssec.dll | 6.2.10240.16384 | Directory Service Security UI
|
| | dssenh.dll | 6.2.10240.16384 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsui.dll | 6.2.10240.16384 | Device Setup UI Pages
|
| | dsuiext.dll | 6.2.10240.16384 | Directory Service Common UI
|
| | dswave.dll | 6.2.10240.16384 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 6.2.10240.16384 | Detection and Sharing Status API
|
| | dui70.dll | 6.2.10240.16384 | Windows DirectUI Engine
|
| | duser.dll | 6.2.10240.16384 | Windows DirectUser Engine
|
| | dwmapi.dll | 6.2.10240.16392 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 6.2.10240.16461 | Microsoft DWM Core Library
|
| | dwrite.dll | 6.2.10240.16430 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 6.2.10240.16384 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 6.2.10240.16412 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.10240.16384 | Microsoft Windows Media Component Removal File.
|
| | dxptasksync.dll | 6.2.10240.16384 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 11.0.10240.16384 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 11.0.10240.16384 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 6.2.10240.16384 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 6.2.10240.16384 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 6.2.10240.16384 | Eap Peer Config
|
| | eappgnui.dll | 6.2.10240.16384 | EAP Generic UI
|
| | eapphost.dll | 6.2.10240.16384 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 6.2.10240.16384 | Microsoft EAPHost Peer Client DLL
|
| | eapprovp.dll | 6.2.10240.16384 | EAP extension DLL
|
| | easwrt.dll | 6.2.10240.16384 | Exchange ActiveSync Windows Runtime DLL
|
| | edgehtml.dll | 11.0.10240.16485 | Microsoft (R) HTML Viewer
|
| | editbuffertesthook.dll | |
|
| | edpauditapi.dll | 6.2.10240.16384 | EDP Audit API
|
| | edputil.dll | 6.2.10240.16384 | EDP util
|
| | efsadu.dll | 6.2.10240.16384 | File Encryption Utility
|
| | efscore.dll | 6.2.10240.16392 | EFS Core Library
|
| | efsext.dll | |
|
| | efsutil.dll | 6.2.10240.16384 | EFS Utility Library
|
| | efswrt.dll | 6.2.10240.16384 | Storage Protection Windows Runtime DLL
|
| | ehstorapi.dll | 6.2.10240.16384 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 6.2.10240.16384 | Microsoft Enhanced Storage Password Manager
|
| | els.dll | 6.2.10240.16384 | Event Viewer Snapin
|
| | elscore.dll | 6.2.10240.16384 | Els Core Platform DLL
|
| | elshyph.dll | 6.2.10240.16384 | ELS Hyphenation Service
|
| | elslad.dll | 6.2.10240.16384 | ELS Language Detection
|
| | elstrans.dll | 6.2.10240.16384 | ELS Transliteration Service
|
| | emailapis.dll | 6.2.10240.16384 | DLL for EmailRT
|
| | embeddedmodesvcapi.dll | 6.2.10240.16384 | Embedded Mode Service Client DLL
|
| | encapi.dll | 6.2.10240.16384 | Encoder API
|
| | encdec.dll | 6.2.10240.16384 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 6.2.10240.16384 | EQoS Snapin extension
|
| | errordetails.dll | 6.2.10240.16384 | Microsoft Windows operating system.
|
| | es.dll | 2001.12.10941.16384 | COM+
|
| | esdsip.dll | 6.2.10240.16384 | Crypto SIP provider for signing and verifying .esd Electronic Software Distribution files
|
| | esent.dll | 6.2.10240.16384 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 6.2.10240.16384 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | esevss.dll | 6.2.10240.16384 | Microsoft(R) ESENT shadow utilities
|
| | etwcoreuicomponentsresources.dll | 6.2.10240.16384 | Microsoft CoreComponents UI ETW manifest Dll
|
| | etweseproviderresources.dll | 6.2.10240.16384 | Microsoft ESE ETW
|
| | eventcls.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 6.2.10240.16384 | Enhanced Video Renderer DLL
|
| | execmodelclient.dll | 6.2.10240.16384 | ExecModelClient
|
| | execmodelproxy.dll | 6.2.10240.16384 | ExecModelProxy
|
| | explorerframe.dll | 6.2.10240.16405 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | exsmime.dll | 6.2.10240.16384 | LExsmime
|
| | extrasxmlparser.dll | 6.2.10240.16384 | Extras XML parser used to extract extension information from XML
|
| | f3ahvoas.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | familysafetyext.dll | 6.2.10240.16384 | FamilySafety ChildAccount Extensions
|
| | faultrep.dll | 6.2.10240.16384 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 6.2.10240.16384 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 6.2.10240.16384 | Bluetooth Provider Proxy Dll
|
| | fddevquery.dll | 6.2.10240.16384 | Microsoft Windows Device Query Helper
|
| | fde.dll | 6.2.10240.16384 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 6.2.10240.16384 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 6.2.10240.16384 | Pnp Provider Dll
|
| | fdprint.dll | 6.2.10240.16384 | Function Discovery Print Provider Dll
|
| | fdproxy.dll | 6.2.10240.16384 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 6.2.10240.16384 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 6.2.10240.16461 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 6.2.10240.16384 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 6.2.10240.16384 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 6.2.10240.16384 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 6.2.10240.16384 | Services and Shared Folders
|
| | findnetprinters.dll | 6.2.10240.16384 | Find Network Printers COM Component
|
| | fingerprintcredential.dll | 6.2.10240.16384 | WinBio Fingerprint Credential
|
| | firewallapi.dll | 6.2.10240.16384 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 6.2.10240.16384 | Windows Firewall Control Panel
|
| | fltlib.dll | 6.2.10240.16384 | Filter Library
|
| | fm20.dll | 12.0.6723.5000 | Microsoft® Forms DLL
|
| | fm20enu.dll | 12.0.4518.1014 | Microsoft® Forms International DLL
|
| | fmifs.dll | 6.2.10240.16384 | FM IFS Utility DLL
|
| | fms.dll | 6.2.10240.16384 | Font Management Services
|
| | fontext.dll | 6.2.10240.16384 | Windows Font Folder
|
| | fontsub.dll | 6.2.10240.16384 | Font Subsetting DLL
|
| | fphc.dll | 6.2.10240.16384 | Filtering Platform Helper Class
|
| | framedyn.dll | 6.2.10240.16384 | WMI SDK Provider Framework
|
| | framedynos.dll | 6.2.10240.16384 | WMI SDK Provider Framework
|
| | frprov.dll | 6.2.10240.16384 | Folder Redirection WMI Provider
|
| | fsutilext.dll | 6.2.10240.16384 | FS Utility Extension DLL
|
| | fundisc.dll | 6.2.10240.16384 | Function Discovery Dll
|
| | fwbase.dll | 6.2.10240.16384 | Firewall Base DLL
|
| | fwcfg.dll | 6.2.10240.16384 | Windows Firewall Configuration Helper
|
| | fwpolicyiomgr.dll | 6.2.10240.16412 | FwPolicyIoMgr DLL
|
| | fwpuclnt.dll | 6.2.10240.16384 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 6.2.10240.16384 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 6.2.10240.16384 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 6.2.10240.16384 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 6.2.10240.16384 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 6.2.10240.16384 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 6.2.10240.16384 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 6.2.10240.16384 | Microsoft Fax Transport Provider
|
| | gameux.dll | 6.2.10240.16384 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gamingtcui.dll | 6.2.10240.16384 | Windows Gaming Internal CallableUI dll
|
| | gcdef.dll | 6.2.10240.16384 | Game Controllers Default Sheets
|
| | gdi32.dll | 6.2.10240.16390 | GDI Client DLL
|
| | gdiplus.dll | 6.2.10240.16384 | Microsoft GDI+
|
| | geocommon.dll | 6.2.10240.16384 | Geocommon
|
| | geolocation.dll | 6.2.10240.16384 | Geolocation Runtime DLL
|
| | geolocatorhelper.dll | 6.2.10240.16384 | GeoLocatorHelper
|
| | getuname.dll | 6.2.10240.16384 | Unicode name Dll for UCE
|
| | glmf32.dll | 6.2.10240.16384 | OpenGL Metafiling DLL
|
| | globcollationhost.dll | 6.2.10240.16384 | GlobCollationHost
|
| | globinputhost.dll | 6.2.10240.16384 | Windows Globalization Extension API for Input
|
| | glu32.dll | 6.2.10240.16384 | OpenGL Utility Library DLL
|
| | gpapi.dll | 6.2.10240.16384 | Group Policy Client API
|
| | gpedit.dll | 6.2.10240.16384 | GPEdit
|
| | gpprefcl.dll | 6.2.10240.16384 | Group Policy Preference Client
|
| | gpprnext.dll | 6.2.10240.16384 | Group Policy Printer Extension
|
| | gpscript.dll | 6.2.10240.16384 | Script Client Side Extension
|
| | gptext.dll | 6.2.10240.16384 | GPTExt
|
| | hbaapi.dll | 6.2.10240.16384 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 6.2.10240.16384 | Security and Maintenance Providers
|
| | helppaneproxy.dll | 6.2.10240.16384 | Microsoft® Help Proxy
|
| | hevcdecoder.dll | 6.2.10240.16384 | Windows H265 Video Decoder
|
| | hgcpl.dll | 6.2.10240.16384 | HomeGroup Control Panel
|
| | hhsetup.dll | 6.2.10240.16384 | Microsoft® HTML Help
|
| | hid.dll | 6.2.10240.16384 | Hid User Library
|
| | hidserv.dll | 6.2.10240.16384 | Human Interface Device Service
|
| | hlink.dll | 6.2.10240.16384 | Microsoft Office 2000 component
|
| | hmkd.dll | 6.2.10240.16385 | Windows HMAC Key Derivation API
|
| | hnetcfg.dll | 6.2.10240.16384 | Home Networking Configuration Manager
|
| | hnetmon.dll | 6.2.10240.16384 | Home Networking Monitor DLL
|
| | hrtfapo.dll | |
|
| | httpapi.dll | 6.2.10240.16384 | HTTP Protocol Stack API
|
| | htui.dll | 6.2.10240.16384 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 6.2.10240.16384 | Network Policy Server
|
| | iasacct.dll | 6.2.10240.16384 | NPS Accounting Provider
|
| | iasads.dll | 6.2.10240.16384 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 6.2.10240.16384 | NPS Datastore server
|
| | iashlpr.dll | 6.2.10240.16384 | NPS Surrogate Component
|
| | iasmigplugin.dll | 6.2.10240.16384 | NPS Migration DLL
|
| | iasnap.dll | 6.2.10240.16384 | NPS NAP Provider
|
| | iaspolcy.dll | 6.2.10240.16384 | NPS Pipeline
|
| | iasrad.dll | 6.2.10240.16384 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 6.2.10240.16384 | NPS XML Datastore Access
|
| | iassam.dll | 6.2.10240.16384 | NPS NT SAM Provider
|
| | iassdo.dll | 6.2.10240.16384 | NPS SDO Component
|
| | iassvcs.dll | 6.2.10240.16384 | NPS Services Component
|
| | iccvid.dll | 1.10.0.12 | Cinepak® Codec
|
| | icm32.dll | 6.2.10240.16384 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 6.2.10240.16384 | ICMP DLL
|
| | icmui.dll | 6.2.10240.16384 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 6.2.10240.16384 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 6.2.10240.16384 | Internet Gateway Device properties
|
| | idctrls.dll | 6.2.10240.16384 | Identity Controls
|
| | idndl.dll | 6.2.10240.16384 | Downlevel DLL
|
| | idstore.dll | 6.2.10240.16384 | Identity Store
|
| | ieadvpack.dll | 11.0.10240.16384 | ADVPACK
|
| | ieapfltr.dll | 11.0.10240.16384 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.10240.16384 | IEAK branding
|
| | ieetwproxystub.dll | 11.0.10240.16384 | IE ETW Collector Proxy Stub Resources
|
| | ieframe.dll | 11.0.10240.16485 | Internet Browser
|
| | iepeers.dll | 11.0.10240.16384 | Internet Explorer Peer Objects
|
| | ieproxy.dll | 11.0.10240.16386 | IE ActiveX Interface Marshaling Library
|
| | iernonce.dll | 11.0.10240.16384 | Extended RunOnce processing with UI
|
| | iertutil.dll | 11.0.10240.16485 | Run time utility for Internet Explorer
|
| | iesetup.dll | 11.0.10240.16384 | IOD Version Map
|
| | iesysprep.dll | 11.0.10240.16384 | IE Sysprep Provider
|
| | ieui.dll | 11.0.10240.16384 | Internet Explorer UI Engine
|
| | ifmon.dll | 6.2.10240.16384 | IF Monitor DLL
|
| | ifsutil.dll | 6.2.10240.16384 | IFS Utility DLL
|
| | ifsutilx.dll | 6.2.10240.16384 | IFS Utility Extension DLL
|
| | ig7icd32.dll | 10.18.10.4252 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | igd10iumd32.dll | 10.18.10.4252 | User Mode Driver for Intel(R) Graphics Technology
|
| | igd10umd32.dll | 9.17.10.2843 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igdail32.dll | |
|
| | igdbcl32.dll | 10.18.10.4252 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdde32.dll | |
|
| | igdfcl32.dll | 10.18.10.4252 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdmd32.dll | 10.18.10.4252 | Metrics Discovery API for Intel(R) Graphics Accelerator
|
| | igdrcl32.dll | 10.18.10.4252 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdumd32.dll | 9.17.10.2843 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igdumdim32.dll | 10.18.10.4252 | User Mode Driver for Intel(R) Graphics Technology
|
| | igdusc32.dll | 10.18.10.4252 | Unified Shader Compiler for Intel(R) Graphics Accelerator
|
| | igfx11cmrt32.dll | 3.0.0.1284 | MDF(CM) Runtime DX11 Dynamic Link Library
|
| | igfxcmjit32.dll | 3.0.0.1284 | MDF(CM) JIT Dynamic Link Library
|
| | igfxcmrt32.dll | 3.0.0.1284 | MDF(CM) Runtime Dynamic Link Library
|
| | igfxexps32.dll | 6.15.10.4252 | igfxext Module
|
| | iglhcp32.dll | 9.0.20.9000 | iglhcp32 Dynamic Link Library
|
| | iglhsip32.dll | 9.0.20.9000 | iglhsip32 Dynamic Link Library
|
| | imagehlp.dll | 6.2.10240.16384 | Windows NT Image Helper
|
| | imageres.dll | 6.2.10240.16384 | Windows Image Resource
|
| | imagesp1.dll | 6.2.10240.16384 | Windows SP1 Image Resource
|
| | imapi.dll | 6.2.10240.16384 | Image Mastering API
|
| | imapi2.dll | 6.2.10240.16384 | Image Mastering API v2
|
| | imapi2fs.dll | 6.2.10240.16384 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 11.0.10240.16384 | IE plugin image decoder support DLL
|
| | imm32.dll | 6.2.10240.16384 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 6.2.10240.16384 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 6.2.10240.16384 | Microsoft MIB-II subagent
|
| | inetres.dll | 6.2.10240.16384 | Microsoft Internet Messaging API Resources
|
| | inkanalysis.dll | 6.2.10240.16384 | InkAnalysis DLL
|
| | inked.dll | 6.2.10240.16384 | Microsoft Tablet PC InkEdit Control
|
| | inkobjcore.dll | 6.2.10240.16384 | Microsoft Tablet PC Ink Platform Component
|
| | input.dll | 6.2.10240.16384 | InputSetting DLL
|
| | inputinjectionbroker.dll | 6.2.10240.16384 | Broker for WinRT input injection.
|
| | inputlocalemanager.dll | |
|
| | inputservice.dll | |
|
| | inputswitch.dll | 6.2.10240.16384 | Microsoft Windows Input Switcher
|
| | inseng.dll | 11.0.10240.16384 | Install engine
|
| | intel_opencl_icd32.dll | 1.2.11.0 | OpenCL Client DLL
|
| | intelopencl32.dll | 10.18.10.4252 | Intel(R) OpenCL(TM) Common Runtime Driver
|
| | iologmsg.dll | 6.2.10240.16384 | IO Logging DLL
|
| | iotassignedaccesslockframework.dll | 6.2.10240.16384 | Windows Runtime Assigned Access Management DLL
|
| | ipeloggingdictationhelper.dll | 1.0.0.1 | IPE Logging Library Helper
|
| | iphlpapi.dll | 6.2.10240.16384 | IP Helper API
|
| | iprop.dll | 6.2.10240.16384 | OLE PropertySet Implementation
|
| | iprtprio.dll | 6.2.10240.16384 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 6.2.10240.16384 | IP Router Manager
|
| | ipsecsnp.dll | 6.2.10240.16384 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 6.2.10240.16384 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 6.2.10240.16384 | IR32_32 WRAPPER DLL
|
| | ir32_32original.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_32original.dll | 4.51.16.3 | Intel Indeo® Video 4.5
|
| | ir41_qc.dll | 6.2.10240.16384 | IR41_QC WRAPPER DLL
|
| | ir41_qcoriginal.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 6.2.10240.16384 | IR41_QCX WRAPPER DLL
|
| | ir41_qcxoriginal.dll | 4.30.64.1 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 6.2.10240.16384 | IR50_32 WRAPPER DLL
|
| | ir50_32original.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 6.2.10240.16384 | IR50_QC WRAPPER DLL
|
| | ir50_qcoriginal.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 6.2.10240.16384 | IR50_QCX WRAPPER DLL
|
| | ir50_qcxoriginal.dll | 5.0.64.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 6.2.10240.16384 | Infrared Class Coinstaller
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 6.2.10240.16384 | iSCSI Discovery api
|
| | iscsied.dll | 6.2.10240.16384 | iSCSI Extension DLL
|
| | iscsium.dll | 6.2.10240.16384 | iSCSI Discovery api
|
| | iscsiwmi.dll | 6.2.10240.16384 | MS iSCSI Initiator WMI Provider
|
| | iscsiwmiv2.dll | 6.2.10240.16384 | WMI Provider for iSCSI
|
| | itircl.dll | 6.2.10240.16384 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 6.2.10240.16384 | Microsoft® InfoTech Storage System Library
|
| | iyuv_32.dll | 6.2.10240.16384 | Intel Indeo(R) Video YUV Codec
|
| | javascriptcollectionagent.dll | 11.0.10240.16384 | JavaScript Performance Collection Agent
|
| | jdns_sd.dll | 1.0.6.2 | Bonjour support for Java
|
| | joinproviderol.dll | 6.2.10240.16384 | Online Join Provider DLL
|
| | joinutil.dll | 6.2.10240.16384 | Join Utility DLL
|
| | jpmapcontrol.dll | 6.2.10240.16384 | Jupiter Map Control
|
| | jscript.dll | 5.812.10240.16485 | Microsoft ® JScript
|
| | jscript9.dll | 11.0.10240.16386 | Microsoft ® JScript
|
| | jscript9diag.dll | 11.0.10240.16384 | Microsoft ® JScript Diagnostics
|
| | jsproxy.dll | 11.0.10240.16384 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 6.2.10240.16384 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 6.2.10240.16384 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 6.2.10240.16384 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 6.2.10240.16384 | Albania Keyboard Layout
|
| | kbdarme.dll | 6.2.10240.16384 | Eastern Armenian Keyboard Layout
|
| | kbdarmph.dll | 6.2.10240.16384 | Armenian Phonetic Keyboard Layout
|
| | kbdarmty.dll | 6.2.10240.16384 | Armenian Typewriter Keyboard Layout
|
| | kbdarmw.dll | 6.2.10240.16384 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 6.2.10240.16384 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 6.2.10240.16384 | Azeri-Latin Keyboard Layout
|
| | kbdazst.dll | 6.2.10240.16384 | Azerbaijani (Standard) Keyboard Layout
|
| | kbdbash.dll | 6.2.10240.16384 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 6.2.10240.16384 | Belgian Keyboard Layout
|
| | kbdbene.dll | 6.2.10240.16384 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 6.2.10240.16384 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 6.2.10240.16384 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 6.2.10240.16384 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 6.2.10240.16384 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 6.2.10240.16384 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 6.2.10240.16384 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbug.dll | 6.2.10240.16384 | Buginese Keyboard Layout
|
| | kbdbulg.dll | 6.2.10240.16384 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 6.2.10240.16384 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 6.2.10240.16384 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcher.dll | 6.2.10240.16384 | Cherokee Nation Keyboard Layout
|
| | kbdcherp.dll | 6.2.10240.16384 | Cherokee Phonetic Keyboard Layout
|
| | kbdcr.dll | 6.2.10240.16384 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 6.2.10240.16384 | Czech Keyboard Layout
|
| | kbdcz1.dll | 6.2.10240.16384 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 6.2.10240.16384 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 6.2.10240.16384 | Danish Keyboard Layout
|
| | kbddiv1.dll | 6.2.10240.16384 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 6.2.10240.16384 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 6.2.10240.16384 | Dvorak US English Keyboard Layout
|
| | kbddzo.dll | 6.2.10240.16384 | Dzongkha Keyboard Layout
|
| | kbdes.dll | 6.2.10240.16384 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 6.2.10240.16384 | Estonia Keyboard Layout
|
| | kbdfa.dll | 6.2.10240.16384 | Persian Keyboard Layout
|
| | kbdfar.dll | 6.2.10240.16384 | Persian Standard Keyboard Layout
|
| | kbdfc.dll | 6.2.10240.16384 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 6.2.10240.16384 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 6.2.10240.16384 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 6.2.10240.16384 | Færoese Keyboard Layout
|
| | kbdfr.dll | 6.2.10240.16384 | French Keyboard Layout
|
| | kbdfthrk.dll | 6.2.10240.16384 | Futhark Keyboard Layout
|
| | kbdgae.dll | 6.2.10240.16384 | Scottish Gaelic (United Kingdom) Keyboard Layout
|
| | kbdgeo.dll | 6.2.10240.16384 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 6.2.10240.16384 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeome.dll | 6.2.10240.16384 | Georgian (MES) Keyboard Layout
|
| | kbdgeooa.dll | 6.2.10240.16384 | Georgian (Old Alphabets) Keyboard Layout
|
| | kbdgeoqw.dll | 6.2.10240.16384 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 6.2.10240.16384 | Greek_Latin Keyboard Layout
|
| | kbdgn.dll | 6.2.10240.16384 | Guarani Keyboard Layout
|
| | kbdgr.dll | 6.2.10240.16384 | German Keyboard Layout
|
| | kbdgr1.dll | 6.2.10240.16384 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 6.2.10240.16384 | Greenlandic Keyboard Layout
|
| | kbdgthc.dll | 6.2.10240.16384 | Gothic Keyboard Layout
|
| | kbdhau.dll | 6.2.10240.16384 | Hausa Keyboard Layout
|
| | kbdhaw.dll | 6.2.10240.16384 | Hawaiian Keyboard Layout
|
| | kbdhe.dll | 6.2.10240.16384 | Greek Keyboard Layout
|
| | kbdhe220.dll | 6.2.10240.16384 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 6.2.10240.16384 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 6.2.10240.16384 | KBDHEB Keyboard Layout
|
| | kbdhebl3.dll | 6.2.10240.16384 | Hebrew Standard Keyboard Layout
|
| | kbdhela2.dll | 6.2.10240.16384 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 6.2.10240.16384 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 6.2.10240.16384 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 6.2.10240.16384 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 6.2.10240.16384 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 6.2.10240.16384 | Igbo Keyboard Layout
|
| | kbdic.dll | 6.2.10240.16384 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 6.2.10240.16384 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 6.2.10240.16384 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 6.2.10240.16384 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 6.2.10240.16384 | Bengali Keyboard Layout
|
| | kbdindev.dll | 6.2.10240.16384 | Devanagari Keyboard Layout
|
| | kbdinen.dll | 6.2.10240.16384 | English (India) Keyboard Layout
|
| | kbdinguj.dll | 6.2.10240.16384 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 6.2.10240.16384 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 6.2.10240.16384 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 6.2.10240.16384 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 6.2.10240.16384 | Marathi Keyboard Layout
|
| | kbdinori.dll | 6.2.10240.16384 | Odia Keyboard Layout
|
| | kbdinpun.dll | 6.2.10240.16384 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 6.2.10240.16384 | Tamil Keyboard Layout
|
| | kbdintel.dll | 6.2.10240.16384 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 6.2.10240.16384 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 6.2.10240.16384 | Irish Keyboard Layout
|
| | kbdit.dll | 6.2.10240.16384 | Italian Keyboard Layout
|
| | kbdit142.dll | 6.2.10240.16384 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 6.2.10240.16384 | Inuktitut Latin Keyboard Layout
|
| | kbdjav.dll | 6.2.10240.16384 | Javanese Keyboard Layout
|
| | kbdjpn.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 6.2.10240.16384 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 6.2.10240.16384 | Cambodian Standard Keyboard Layout
|
| | kbdkni.dll | 6.2.10240.16384 | Khmer (NIDA) Keyboard Layout
|
| | kbdkor.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkurd.dll | 6.2.10240.16384 | Central Kurdish Keyboard Layout
|
| | kbdkyr.dll | 6.2.10240.16384 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 6.2.10240.16384 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 6.2.10240.16384 | Lao Standard Keyboard Layout
|
| | kbdlisub.dll | 6.2.10240.16384 | Lisu Basic Keyboard Layout
|
| | kbdlisus.dll | 6.2.10240.16384 | Lisu Standard Keyboard Layout
|
| | kbdlk41a.dll | 6.2.10240.16384 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 6.2.10240.16384 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 6.2.10240.16384 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 6.2.10240.16384 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 6.2.10240.16384 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 6.2.10240.16384 | Latvia-QWERTY Keyboard Layout
|
| | kbdlvst.dll | 6.2.10240.16384 | Latvian (Standard) Keyboard Layout
|
| | kbdmac.dll | 6.2.10240.16384 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 6.2.10240.16384 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 6.2.10240.16384 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 6.2.10240.16384 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 6.2.10240.16384 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 6.2.10240.16384 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 6.2.10240.16384 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdmonst.dll | 6.2.10240.16384 | Traditional Mongolian (Standard) Keyboard Layout
|
| | kbdmyan.dll | 6.2.10240.16384 | Myanmar Keyboard Layout
|
| | kbdne.dll | 6.2.10240.16384 | Dutch Keyboard Layout
|
| | kbdnec.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 6.2.10240.16384 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 6.2.10240.16384 | Nepali Keyboard Layout
|
| | kbdnko.dll | 6.2.10240.16384 | N'Ko Keyboard Layout
|
| | kbdno.dll | 6.2.10240.16384 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 6.2.10240.16384 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 6.2.10240.16384 | Sesotho sa Leboa Keyboard Layout
|
| | kbdntl.dll | 6.2.10240.16384 | New Tai Leu Keyboard Layout
|
| | kbdogham.dll | 6.2.10240.16384 | Ogham Keyboard Layout
|
| | kbdolch.dll | 6.2.10240.16384 | Ol Chiki Keyboard Layout
|
| | kbdoldit.dll | 6.2.10240.16384 | Old Italic Keyboard Layout
|
| | kbdosm.dll | 6.2.10240.16384 | Osmanya Keyboard Layout
|
| | kbdpash.dll | 6.2.10240.16384 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdphags.dll | 6.2.10240.16384 | Phags-pa Keyboard Layout
|
| | kbdpl.dll | 6.2.10240.16384 | Polish Keyboard Layout
|
| | kbdpl1.dll | 6.2.10240.16384 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 6.2.10240.16384 | Portuguese Keyboard Layout
|
| | kbdro.dll | 6.2.10240.16384 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 6.2.10240.16384 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 6.2.10240.16384 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 6.2.10240.16384 | Russian Keyboard Layout
|
| | kbdru1.dll | 6.2.10240.16384 | Russia(Typewriter) Keyboard Layout
|
| | kbdrum.dll | 6.2.10240.16384 | Russian - Mnemonic Keyboard Layout
|
| | kbdsf.dll | 6.2.10240.16384 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 6.2.10240.16384 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 6.2.10240.16384 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 6.2.10240.16384 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 6.2.10240.16384 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 6.2.10240.16384 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 6.2.10240.16384 | Sinhala Keyboard Layout
|
| | kbdsora.dll | 6.2.10240.16384 | Sora Keyboard Layout
|
| | kbdsorex.dll | 6.2.10240.16384 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 6.2.10240.16384 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 6.2.10240.16384 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 6.2.10240.16384 | Spanish Keyboard Layout
|
| | kbdsw.dll | 6.2.10240.16384 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 6.2.10240.16384 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 6.2.10240.16384 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 6.2.10240.16384 | Syriac Phoenetic Keyboard Layout
|
| | kbdtaile.dll | 6.2.10240.16384 | Tai Le Keyboard Layout
|
| | kbdtajik.dll | 6.2.10240.16384 | Tajik Keyboard Layout
|
| | kbdtat.dll | 6.2.10240.16384 | Tatar (Legacy) Keyboard Layout
|
| | kbdth0.dll | 6.2.10240.16384 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 6.2.10240.16384 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 6.2.10240.16384 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 6.2.10240.16384 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtifi.dll | 6.2.10240.16384 | Tifinagh (Basic) Keyboard Layout
|
| | kbdtifi2.dll | 6.2.10240.16384 | Tifinagh (Extended) Keyboard Layout
|
| | kbdtiprc.dll | 6.2.10240.16384 | Tibetan (PRC) Keyboard Layout
|
| | kbdtiprd.dll | 6.2.10240.16384 | Tibetan (PRC) - Updated Keyboard Layout
|
| | kbdtt102.dll | 6.2.10240.16384 | Tatar Keyboard Layout
|
| | kbdtuf.dll | 6.2.10240.16384 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 6.2.10240.16384 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 6.2.10240.16384 | Turkmen Keyboard Layout
|
| | kbdtzm.dll | 6.2.10240.16384 | Central Atlas Tamazight Keyboard Layout
|
| | kbdughr.dll | 6.2.10240.16384 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 6.2.10240.16384 | Uyghur Keyboard Layout
|
| | kbduk.dll | 6.2.10240.16384 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 6.2.10240.16384 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 6.2.10240.16384 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 6.2.10240.16384 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 6.2.10240.16384 | Urdu Keyboard Layout
|
| | kbdus.dll | 6.2.10240.16384 | United States Keyboard Layout
|
| | kbdusa.dll | 6.2.10240.16384 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 6.2.10240.16384 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 6.2.10240.16384 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 6.2.10240.16384 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 6.2.10240.16384 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 6.2.10240.16384 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 6.2.10240.16384 | Wolof Keyboard Layout
|
| | kbdyak.dll | 6.2.10240.16384 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 6.2.10240.16384 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 6.2.10240.16384 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 6.2.10240.16384 | Serbian (Latin) Keyboard Layout
|
| | kerbclientshared.dll | 6.2.10240.16384 | Kerberos Client Shared Functionality
|
| | kerberos.dll | 6.2.10240.16384 | Kerberos Security Package
|
| | kernel.appcore.dll | 6.2.10240.16384 | AppModel API Host
|
| | kernel32.dll | 6.2.10240.16384 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 6.2.10240.16384 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 6.2.10240.16384 | CNG Key Isolation Service
|
| | keymgr.dll | 6.2.10240.16384 | Stored User Names and Passwords
|
| | ksuser.dll | 6.2.10240.16384 | User CSA Library
|
| | ktmw32.dll | 6.2.10240.16384 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 6.2.10240.16384 | Policy Storage dll
|
| | l2nacp.dll | 6.2.10240.16384 | Windows Onex Credential Provider
|
| | l2sechc.dll | 6.2.10240.16384 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.10240.16384 | Windows Media Logagent Proxy
|
| | lfsvc.dll | 6.2.10240.16384 | Geolocation Service
|
| | licensemanager.dll | 6.2.10240.16461 | LicenseManager
|
| | licmgr10.dll | 11.0.10240.16384 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 6.2.10240.16384 | Windows Volume Tracking
|
| | loadperf.dll | 6.2.10240.16384 | Load & Unload Performance Counters
|
| | localsec.dll | 6.2.10240.16384 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 6.2.10240.16384 | Microsoft Windows Location API
|
| | locationframework.dll | 6.2.10240.16384 | Windows Geolocation Framework
|
| | locationframeworkinternalps.dll | 6.2.10240.16384 | Windows Geolocation Framework Internal PS
|
| | locationframeworkps.dll | 6.2.10240.16384 | Windows Geolocation Framework PS
|
| | lockappbroker.dll | 6.2.10240.16425 | Windows Lock App Broker DLL
|
| | loghours.dll | 6.2.10240.16384 | Schedule Dialog
|
| | logoncli.dll | 6.2.10240.16384 | Net Logon Client DLL
|
| | logoncontroller.dll | 6.2.10240.16425 | Logon UX Controller
|
| | lpk.dll | 6.2.10240.16384 | Language Pack
|
| | lsmproxy.dll | 6.2.10240.16384 | LSM interfaces proxy Dll
|
| | luainstall.dll | 6.2.10240.16384 | Lua manifest install
|
| | lz32.dll | 6.2.10240.16384 | LZ Expand/Compress API DLL
|
| | magnification.dll | 6.2.10240.16384 | Microsoft Magnification API
|
| | mapconfiguration.dll | 6.2.10240.16392 | MapConfiguration
|
| | mapcontrolcore.dll | 6.2.10240.16384 | Map Control Core
|
| | mapcontrolstringsres.dll | 6.2.10240.16384 | Map control resource strings
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapsbtsvc.dll | 6.2.10240.16384 | Maps Background Transfer Service
|
| | mbaeapi.dll | 6.2.10240.16431 | Mobile Broadband Account Experience API
|
| | mbaeapipublic.dll | 6.2.10240.16431 | Mobile Broadband Account API
|
| | mbsmsapi.dll | 6.2.10240.16384 | Microsoft Windows Mobile Broadband SMS API
|
| | mbussdapi.dll | 6.2.10240.16384 | Microsoft Windows Mobile Broadband USSD API
|
| | mcewmdrmndbootstrap.dll | 1.3.2310.10 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 6.2.10240.16384 | Video For Windows MCI driver
|
| | mcicda.dll | 6.2.10240.16384 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 6.2.10240.16384 | DirectShow MCI Driver
|
| | mciseq.dll | 6.2.10240.16384 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 6.2.10240.16384 | MCI driver for waveform audio
|
| | mcrecvsrc.dll | 12.0.10240.16385 | Miracast Media Foundation Source DLL
|
| | mdminst.dll | 6.2.10240.16384 | Modem Class Installer
|
| | mdmregistration.dll | 6.2.10240.16384 | MDM Registration DLL
|
| | messagingdatamodel2.dll | 6.2.10240.16394 | MessagingDataModel2
|
| | mf.dll | 12.0.10240.16384 | Media Foundation DLL
|
| | mf3216.dll | 6.2.10240.16384 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 6.2.10240.16384 | Media Foundation AAC Encoder
|
| | mfasfsrcsnk.dll | 12.0.10240.16384 | Media Foundation ASF Source and Sink DLL
|
| | mfc100.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc100chs.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100cht.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100deu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100enu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100esn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100fra.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100ita.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100jpn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100kor.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100rus.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100u.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc110.dll | 11.0.60610.1 | MFCDLL Shared Library - Retail Version
|
| | mfc110chs.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110cht.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110deu.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110enu.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110esn.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110fra.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110ita.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110jpn.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110kor.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110rus.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110u.dll | 11.0.60610.1 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfcaptureengine.dll | 12.0.10240.16384 | Media Foundation CaptureEngine DLL
|
| | mfcm100.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm110.dll | 11.0.60610.1 | MFC Managed Library - Retail Version
|
| | mfcm110u.dll | 11.0.60610.1 | MFC Managed Library - Retail Version
|
| | mfcore.dll | 12.0.10240.16431 | Media Foundation Core DLL
|
| | mfcsubs.dll | 2001.12.10941.16384 | COM+
|
| | mfds.dll | 12.0.10240.16384 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 6.2.10240.16384 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.10240.16384 | Media Foundation Error DLL
|
| | mfh263enc.dll | 6.2.10240.16384 | Media Foundation h263 Encoder
|
| | mfh264enc.dll | 6.2.10240.16384 | Media Foundation H264 Encoder
|
| | mfh265enc.dll | 6.2.10240.16384 | Media Foundation H265 Encoder
|
| | mfmediaengine.dll | 6.2.10240.16431 | Media Foundation Media Engine DLL
|
| | mfmjpegdec.dll | 6.2.10240.16384 | Media Foundation MJPEG Decoder
|
| | mfmkvsrcsnk.dll | 6.2.10240.16412 | Media Foundation MKV Media Source and Sink DLL
|
| | mfmp4srcsnk.dll | 12.0.10240.16412 | Media Foundation MPEG4 Source and Sink DLL
|
| | mfmpeg2srcsnk.dll | 12.0.10240.16412 | Media Foundation MPEG2 Source and Sink DLL
|
| | mfnetcore.dll | 12.0.10240.16384 | Media Foundation Net Core DLL
|
| | mfnetsrc.dll | 12.0.10240.16384 | Media Foundation Net Source DLL
|
| | mfperfhelper.dll | 12.0.10240.16384 | MFPerf DLL
|
| | mfplat.dll | 12.0.10240.16431 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.10240.16412 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.10240.16384 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.10240.16384 | Media Foundation ReadWrite DLL
|
| | mfsrcsnk.dll | 12.0.10240.16412 | Media Foundation Source and Sink DLL
|
| | mfsvr.dll | 6.2.10240.16427 | Media Foundation Simple Video Renderer DLL
|
| | mftranscode.dll | 12.0.10240.16384 | Media Foundation Transcode DLL
|
| | mfvdsp.dll | 6.2.10240.16384 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 6.2.10240.16384 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 6.2.10240.16384 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | mi.dll | 6.2.10240.16384 | Management Infrastructure
|
| | mibincodec.dll | 6.2.10240.16384 | Management Infrastructure binary codec component
|
| | microsoft.management.infrastructure.native.unmanaged.dll | 6.2.10240.16384 | Microsoft.Management.Infrastructure.Native.Unmanaged.dll
|
| | microsoftaccountextension.dll | 6.2.10240.16384 | Microsoft Account Extension DLL
|
| | microsoftaccounttokenprovider.dll | 6.2.10240.16384 | Microsoft® Account Token Provider
|
| | microsoft-windows-mapcontrols.dll | 6.2.10240.16384 | Map Event Resources
|
| | microsoft-windows-moshost.dll | 6.2.10240.16384 | MosHost Event Resources
|
| | microsoft-windows-mostrace.dll | 6.2.10240.16384 | MOS Event Resources
|
| | midimap.dll | 6.2.10240.16384 | Microsoft MIDI Mapper
|
| | migisol.dll | 6.2.10240.16384 | Migration System Isolation Layer
|
| | miguiresource.dll | 6.2.10240.16384 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.10240.16384 | MIME Filter
|
| | mimofcodec.dll | 6.2.10240.16384 | Management Infrastructure mof codec component
|
| | minstoreevents.dll | 6.2.10240.16384 | Minstore Event Resource
|
| | miracastreceiver.dll | 12.0.10240.16384 | Miracast Receiver API
|
| | mirrordrvcompat.dll | 6.2.10240.16384 | Mirror Driver Compatibility Helper
|
| | mispace.dll | 6.2.10240.16384 | Storage Management Provider for Spaces
|
| | miutils.dll | 6.2.10240.16384 | Management Infrastructure
|
| | mlang.dll | 6.2.10240.16384 | Multi Language Support DLL
|
| | mmcbase.dll | 6.2.10240.16384 | MMC Base DLL
|
| | mmci.dll | 6.2.10240.16384 | Media class installer
|
| | mmcico.dll | 6.2.10240.16384 | Media class co-installer
|
| | mmcndmgr.dll | 6.2.10240.16384 | MMC Node Manager DLL
|
| | mmcshext.dll | 6.2.10240.16384 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 6.2.10240.16384 | MMDevice API
|
| | mmres.dll | 6.2.10240.16384 | General Audio Resources
|
| | modemui.dll | 6.2.10240.16384 | Windows Modem Properties
|
| | moricons.dll | 6.2.10240.16384 | Windows NT Setup Icon Resources Library
|
| | mos.dll | 6.2.10240.16392 | mos
|
| | moshostclient.dll | 6.2.10240.16384 | MosHostClient
|
| | mp3dmod.dll | 6.2.10240.16384 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 6.2.10240.16384 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 6.2.10240.16384 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 6.2.10240.16384 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 6.2.10240.16384 | Multiple Provider Router DLL
|
| | mprapi.dll | 6.2.10240.16384 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 6.2.10240.16384 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 6.2.10240.16384 | Dynamic Interface Manager
|
| | mprext.dll | 6.2.10240.16384 | Multiple Provider Router Extension DLL
|
| | mprmsg.dll | 6.2.10240.16384 | Multi-Protocol Router Service Messages DLL
|
| | mrmcorer.dll | 6.2.10240.16385 | Microsoft Windows MRM
|
| | mrmindexer.dll | 6.2.10240.16384 | Microsoft Windows MRM
|
| | mrt_map.dll | 1.0.22929.0 | Microsoft .NET Native Error Reporting Helper
|
| | mrt100.dll | 1.0.22929.0 | Microsoft .NET Native Runtime
|
| | ms3dthumbnailprovider.dll | 6.2.10240.16384 | 3MF Metadata Handler
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 6.2.10240.16384 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 6.2.10240.16384 | Microsoft ACM Audio Filter
|
| | msadce.dll | 6.2.10240.16384 | OLE DB Cursor Engine
|
| | msadcer.dll | 6.2.10240.16384 | OLE DB Cursor Engine Resources
|
| | msadco.dll | 6.2.10240.16384 | Remote Data Services Data Control
|
| | msadcor.dll | 6.2.10240.16384 | Remote Data Services Data Control Resources
|
| | msadds.dll | 6.2.10240.16384 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 6.2.10240.16384 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 6.2.10240.16384 | ActiveX Data Objects Resources
|
| | msado15.dll | 6.2.10240.16384 | ActiveX Data Objects
|
| | msadomd.dll | 6.2.10240.16384 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 6.2.10240.16384 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 6.2.10240.16384 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 6.2.10240.16384 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 6.2.10240.16384 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msajapi.dll | 6.2.10240.16384 | AllJoyn API Library
|
| | msalacdecoder.dll | 6.2.10240.16384 | Media Foundation ALAC Decoder
|
| | msalacencoder.dll | 6.2.10240.16384 | Media Foundation ALAC Encoder
|
| | msamrnbdecoder.dll | 6.2.10240.16384 | AMR Narrowband Decoder DLL
|
| | msamrnbencoder.dll | 6.2.10240.16384 | AMR Narrowband Encoder DLL
|
| | msamrnbsink.dll | 6.2.10240.16384 | AMR Narrowband Sink DLL
|
| | msamrnbsource.dll | 6.2.10240.16384 | AMR Narrowband Source DLL
|
| | msasn1.dll | 6.2.10240.16384 | ASN.1 Runtime APIs
|
| | msauddecmft.dll | 6.2.10240.16384 | Media Foundation Audio Decoders
|
| | msaudite.dll | 6.2.10240.16384 | Security Audit Events DLL
|
| | msauserext.dll | 6.2.10240.16384 | MSA USER Extension DLL
|
| | mscandui.dll | 6.2.10240.16384 | MSCANDUI Server DLL
|
| | mscat32.dll | 6.2.10240.16384 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 10.0.10240.16384 | Microsoft Class Mini-driver
|
| | mscms.dll | 6.2.10240.16384 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 6.2.10240.16384 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 6.2.10240.16384 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.8662 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 6.2.10240.16384 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 6.2.10240.16384 | ODBC Code Page Translator
|
| | msctf.dll | 6.2.10240.16384 | MSCTF Server DLL
|
| | msctfmonitor.dll | 6.2.10240.16384 | MsCtfMonitor DLL
|
| | msctfp.dll | 6.2.10240.16384 | MSCTFP Server DLL
|
| | msctfui.dll | 6.2.10240.16384 | MSCTFUI Server DLL
|
| | msctfuimanager.dll | 6.2.10240.16425 | Microsoft UIManager DLL
|
| | msdadc.dll | 6.2.10240.16384 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 6.2.10240.16384 | Built-In Diagnostics
|
| | msdaenum.dll | 6.2.10240.16384 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 6.2.10240.16384 | OLE DB Error Collection Stub
|
| | msdaora.dll | 6.2.10240.16384 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 6.2.10240.16384 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 6.2.10240.16384 | OLE DB Simple Provider
|
| | msdaprsr.dll | 6.2.10240.16384 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 6.2.10240.16384 | OLE DB Persistence Services
|
| | msdaps.dll | 6.2.10240.16384 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 6.2.10240.16384 | OLE DB Remote Provider
|
| | msdaremr.dll | 6.2.10240.16384 | OLE DB Remote Provider Resources
|
| | msdart.dll | 6.2.10240.16384 | OLE DB Runtime Routines
|
| | msdasc.dll | 6.2.10240.16384 | OLE DB Service Components Stub
|
| | msdasql.dll | 6.2.10240.16384 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 6.2.10240.16384 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 6.2.10240.16384 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 6.2.10240.16384 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 6.2.10240.16384 | OLE DB RootBinder Stub
|
| | msdelta.dll | 6.2.10240.16384 | Microsoft Patch Engine
|
| | msdfmap.dll | 6.2.10240.16384 | Data Factory Handler
|
| | msdmeng.dll | 8.0.2039.0 | Microsoft Data Mining Engine
|
| | msdmine.dll | 8.0.2039.0 | Microsoft OLE DB Provider for Data Mining Services
|
| | msdmo.dll | 6.2.10240.16384 | DMO Runtime
|
| | msdrm.dll | 6.2.10240.16384 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 11.0.10240.16384 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 11.0.10240.16384 | Microsoft Feeds Background Sync
|
| | msflacdecoder.dll | 6.2.10240.16384 | Media Foundation FLAC Decoder
|
| | msflacencoder.dll | 6.2.10240.16384 | Media Foundation FLAC Encoder
|
| | msftedit.dll | 6.2.10240.16386 | Rich Text Edit Control, v7.5
|
| | mshtml.dll | 11.0.10240.16485 | Microsoft (R) HTML Viewer
|
| | mshtmldac.dll | 11.0.10240.16384 | DAC for Trident DOM
|
| | mshtmled.dll | 11.0.10240.16384 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 11.0.10240.16384 | Microsoft® HTML Editing Component's Resource DLL
|
| | msi.dll | 5.0.10240.16386 | Windows Installer
|
| | msidcrl40.dll | 6.2.10240.16384 | Microsoft® Account Dynamic Link Library
|
| | msident.dll | 6.2.10240.16384 | Microsoft Identity Manager
|
| | msidle.dll | 6.2.10240.16384 | User Idle Monitor
|
| | msidntld.dll | 6.2.10240.16384 | Microsoft Identity Manager
|
| | msieftp.dll | 6.2.10240.16384 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.10240.16384 | Windows® installer
|
| | msiltcfg.dll | 5.0.10240.16384 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 6.2.10240.16384 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.10240.16384 | Windows® Installer International Messages
|
| | msimtf.dll | 6.2.10240.16384 | Active IMM Server DLL
|
| | msisip.dll | 5.0.10240.16384 | MSI Signature SIP Provider
|
| | msiwer.dll | 5.0.10240.16384 | MSI Windows Error Reporting
|
| | msjet40.dll | 4.0.9765.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9765.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 6.2.10240.16384 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | mskeyprotcli.dll | 6.2.10240.16384 | Windows Client Key Protection Provider
|
| | mskeyprotect.dll | 6.2.10240.16384 | Microsoft Key Protection Provider
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmdcb80.dll | 8.0.2278.0 | PivotTable Service dll
|
| | msmdgd80.dll | 8.0.2039.0 | Microsoft SQL Server Analysis Services driver
|
| | msmdun80.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | msmpeg2adec.dll | 12.0.10133.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 12.0.10240.16384 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 12.0.10133.0 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.10240.16384 | DRM ActiveX Network Object
|
| | msobjs.dll | 6.2.10240.16384 | System object audit names
|
| | msoeacct.dll | 6.2.10240.16384 | Microsoft Internet Account Manager
|
| | msoert2.dll | 6.2.10240.16384 | Microsoft Windows Mail RT Lib
|
| | msolap80.dll | 8.0.2216.0 | Microsoft OLE DB Provider for Analysis Services 8.0
|
| | msolui80.dll | 8.0.0.2039 | Microsoft OLE DB provider for Analysis Services connection dialog 8.0
|
| | msorc32r.dll | 6.2.10240.16384 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 6.2.10240.16384 | ODBC Driver for Oracle
|
| | mspatcha.dll | 6.2.10240.16384 | Microsoft File Patch Application API
|
| | mspatchc.dll | 6.2.10240.16384 | Microsoft Patch Creation Engine
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msphotography.dll | 6.2.10240.16384 | MS Photography DLL
|
| | msports.dll | 6.2.10240.16384 | Ports Class Installer
|
| | msrating.dll | 11.0.10240.16384 | Internet Ratings and Local User Management DLL
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 6.2.10240.16384 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 6.2.10240.16384 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 6.2.10240.16384 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.10240.16384 | PKM Perfmon Counter DLL
|
| | msscp.dll | 11.0.10240.16384 | Windows Media Secure Content Provider
|
| | msshooks.dll | 7.0.10240.16384 | Microsoft Search Hooks
|
| | mssign32.dll | 6.2.10240.16384 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 6.2.10240.16384 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.10240.16384 | mssitlb
|
| | msspellcheckingfacility.dll | 6.2.10240.16384 | Microsoft Spell Checking Facility
|
| | mssph.dll | 7.0.10240.16384 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.10240.16384 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.10240.16384 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.10240.16431 | Microsoft Embedded Search
|
| | mssvp.dll | 7.0.10240.16384 | MSSearch Vista Platform
|
| | mstask.dll | 6.2.10240.16384 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 6.2.10240.16384 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 6.2.10240.16384 | MSUTB Server DLL
|
| | msv1_0.dll | 6.2.10240.16384 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.10240.16384 | Windows NT IOStreams DLL
|
| | msvcp_win.dll | 6.2.10240.16384 | Microsoft® C Runtime Library
|
| | msvcp100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcp110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcp110_win.dll | 6.2.10240.16384 | Microsoft® STL110 C++ Runtime Library
|
| | msvcp120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcp120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcp60.dll | 7.0.10240.16384 | Windows NT C++ Runtime Library DLL
|
| | msvcr100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 14.0.79.0 | Microsoft® .NET Framework
|
| | msvcr110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcr120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcr120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.10240.16384 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 6.2.10240.16384 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 6.2.10240.16384 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 6.2.10240.16384 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.10240.16384 | ActiveX control for streaming video
|
| | msvideodsp.dll | 6.2.10240.16384 | Video Stabilization MFT
|
| | msvproc.dll | 12.0.10240.16384 | Media Foundation Video Processor
|
| | mswb7.dll | 6.2.10240.16384 | MSWB7 DLL
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.10240.16384 | Windows Media Device Manager Core
|
| | mswsock.dll | 6.2.10240.16384 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9765.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 6.2.10240.16384 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.10240.16384 | MSXML 3.0
|
| | msxml3r.dll | 8.110.10240.16384 | XML Resources
|
| | msxml6.dll | 6.30.10240.16384 | MSXML 6.0
|
| | msxml6r.dll | 6.30.10240.16384 | XML Resources
|
| | msyuv.dll | 6.2.10240.16384 | Microsoft UYVY Video Decompressor
|
| | mtf.dll | |
|
| | mtxclu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.10941.16384 | COM+
|
| | mtxex.dll | 2001.12.10941.16384 | COM+
|
| | mtxlegih.dll | 2001.12.10941.16384 | COM+
|
| | mtxoci.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 6.2.10240.16384 | MUI Callback for font registry settings
|
| | mycomput.dll | 6.2.10240.16384 | Computer Management
|
| | mydocs.dll | 6.2.10240.16384 | My Documents Folder UI
|
| | napcrypt.dll | 6.2.10240.16384 | NAP Cryptographic API helper
|
| | napinsp.dll | 6.2.10240.16384 | E-mail Naming Shim Provider
|
| | naturallanguage6.dll | 6.2.10240.16384 | Natural Language Development Platform 6
|
| | ncaapi.dll | 6.2.10240.16384 | Microsoft Network Connectivity Assistant API
|
| | ncdprop.dll | 6.2.10240.16384 | Advanced network device properties
|
| | nci.dll | 6.2.10240.16384 | CoInstaller: NET
|
| | ncobjapi.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 6.2.10240.16384 | Windows NCrypt Router
|
| | ncryptprov.dll | 6.2.10240.16384 | Microsoft KSP
|
| | ncryptsslp.dll | 6.2.10240.16384 | Microsoft SChannel Provider
|
| | nddeapi.dll | 6.2.10240.16384 | Network DDE Share Management APIs
|
| | ndfapi.dll | 6.2.10240.16384 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 6.2.10240.16384 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 6.2.10240.16384 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 6.2.10240.16384 | NdisCap Notify Object
|
| | ndishc.dll | 6.2.10240.16384 | NDIS Helper Classes
|
| | ndproxystub.dll | 6.2.10240.16384 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 6.2.10240.16384 | NegoExtender Security Package
|
| | netapi32.dll | 6.2.10240.16384 | Net Win32 API DLL
|
| | netbios.dll | 6.2.10240.16384 | NetBIOS Interface Library
|
| | netcenter.dll | 6.2.10240.16384 | Network Center control panel
|
| | netcfgx.dll | 6.2.10240.16384 | Network Configuration Objects
|
| | netcorehc.dll | 6.2.10240.16384 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 6.2.10240.16384 | Network Diagnostic Framework
|
| | netevent.dll | 6.2.10240.16384 | Net Event Handler
|
| | netfxperf.dll | 6.2.10240.16384 | Extensible Performance Counter Shim
|
| | neth.dll | 6.2.10240.16384 | Net Help Messages DLL
|
| | netid.dll | 6.2.10240.16384 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 6.2.10240.16384 | Netio Helper DLL
|
| | netjoin.dll | 6.2.10240.16384 | Domain Join DLL
|
| | netlogon.dll | 6.2.10240.16384 | Net Logon Services DLL
|
| | netmsg.dll | 6.2.10240.16384 | Net Messages DLL
|
| | netplwiz.dll | 6.2.10240.16384 | Map Network Drives/Network Places Wizard
|
| | netprofm.dll | 6.2.10240.16384 | Network List Manager
|
| | netprovfw.dll | 6.2.10240.16384 | Provisioning Service Framework DLL
|
| | netprovisionsp.dll | 6.2.10240.16384 | Provisioning Service Provider DLL
|
| | netsetupapi.dll | 6.2.10240.16384 | Network Configuration API
|
| | netsetupengine.dll | 6.2.10240.16384 | Network Configuration Engine
|
| | netsetupshim.dll | 6.2.10240.16461 | Network Configuration API
|
| | netshell.dll | 6.2.10240.16384 | Network Connections Shell
|
| | netutils.dll | 6.2.10240.16384 | Net Win32 API Helpers DLL
|
| | networkcollectionagent.dll | 11.0.10240.16384 | Network Collection Agent
|
| | networkexplorer.dll | 6.2.10240.16384 | Network Explorer
|
| | networkitemfactory.dll | 6.2.10240.16384 | NetworkItem Factory
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | ngcksp.dll | 6.2.10240.16384 | Microsoft Passport Key Storage Provider
|
| | ninput.dll | 6.2.10240.16384 | Microsoft Pen and Touch Input Component
|
| | nlaapi.dll | 6.2.10240.16384 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.10240.16384 | HTML filter
|
| | nlmgp.dll | 6.2.10240.16384 | Network List Manager Snapin
|
| | nlmproxy.dll | 6.2.10240.16384 | Network List Manager Public Proxy
|
| | nlmsprep.dll | 6.2.10240.16384 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 6.2.10240.16384 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 6.2.10240.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0009.dll | 6.2.10240.16384 | Microsoft English Natural Language Server Data and Code
|
| | nlsdl.dll | 6.2.10240.16384 | Nls Downlevel DLL
|
| | nlslexicons0009.dll | 6.2.10240.16384 | Microsoft English Natural Language Server Data and Code
|
| | nmaa.dll | 6.2.10240.16384 | NMAA
|
| | nmadirect.dll | 8.1.0.65535 | master branch
|
| | normaliz.dll | 6.2.10240.16384 | Unicode Normalization DLL
|
| | notificationobjfactory.dll | 6.2.10240.16425 | Notifications Object Factory
|
| | npmproxy.dll | 6.2.10240.16384 | Network List Manager Proxy
|
| | npsmdesktopprovider.dll | 6.2.10240.16384 | <d> NPSM Desktop Local Provider DLL
|
| | nshhttp.dll | 6.2.10240.16384 | HTTP netsh DLL
|
| | nshipsec.dll | 6.2.10240.16384 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 6.2.10240.16384 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 6.2.10240.16384 | NSI User-mode interface DLL
|
| | ntasn1.dll | 6.2.10240.16384 | Microsoft ASN.1 API
|
| | ntdll.dll | 6.2.10240.16430 | NT Layer DLL
|
| | ntdsapi.dll | 6.2.10240.16384 | Active Directory Domain Services API
|
| | ntlanman.dll | 6.2.10240.16384 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 6.2.10240.16384 | Network object shell UI
|
| | ntlmshared.dll | 6.2.10240.16384 | NTLM Shared Functionality
|
| | ntmarta.dll | 6.2.10240.16384 | Windows NT MARTA provider
|
| | ntprint.dll | 6.2.10240.16384 | Spooler Setup DLL
|
| | ntshrui.dll | 6.2.10240.16405 | Shell extensions for sharing
|
| | ntvdm64.dll | 6.2.10240.16384 | 16-bit Emulation on NT64
|
| | objsel.dll | 6.2.10240.16384 | Object Picker Dialog
|
| | occache.dll | 11.0.10240.16384 | Object Control Viewer
|
| | ocsetapi.dll | 6.2.10240.16384 | Windows Optional Component Setup API
|
| | odbc32.dll | 6.2.10240.16384 | ODBC Driver Manager
|
| | odbcbcp.dll | 6.2.10240.16384 | BCP for ODBC
|
| | odbcconf.dll | 6.2.10240.16384 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 6.2.10240.16384 | ODBC Installer
|
| | odbccr32.dll | 6.2.10240.16384 | ODBC Cursor Library
|
| | odbccu32.dll | 6.2.10240.16384 | ODBC Cursor Library
|
| | odbcint.dll | 6.2.10240.16384 | ODBC Resources
|
| | odbcji32.dll | 6.2.10240.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 6.2.10240.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 6.2.10240.16384 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 6.2.10240.16384 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 6.2.10240.16384 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 6.2.10240.16384 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 6.2.10240.16384 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 6.2.10240.16384 | ODBC (3.0) driver for text files
|
| | oemlicense.dll | 6.2.10240.16384 | Client Licensing Platform Client Provisioning
|
| | offfilt.dll | 2008.0.10240.16384 | OFFICE Filter
|
| | offlinelsa.dll | 6.2.10240.16384 | Windows
|
| | offlinesam.dll | 6.2.10240.16384 | Windows
|
| | offreg.dll | 6.2.10240.16384 | Offline registry DLL
|
| | ogldrv.dll | 6.2.10240.16384 | MSOGL
|
| | ole2.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2disp.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2nls.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole32.dll | 6.2.10240.16384 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.2.10240.16384 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.2.10240.16384 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.2.10240.16384 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 6.2.10240.16384 |
|
| | olecli32.dll | 6.2.10240.16384 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 6.2.10240.16384 | OLE DB Core Services
|
| | oledb32r.dll | 6.2.10240.16384 | OLE DB Core Services Resources
|
| | oledlg.dll | 6.2.10240.16384 | OLE User Interface Support
|
| | oleprn.dll | 6.2.10240.16384 | Oleprn DLL
|
| | olepro32.dll | 6.2.10240.16384 |
|
| | olesvr32.dll | 6.2.10240.16384 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 6.2.10240.16384 | Microsoft OLE for Windows
|
| | ondemandbrokerclient.dll | 6.2.10240.16384 | OnDemandBrokerClient
|
| | ondemandconnroutehelper.dll | 6.2.10240.16384 | On Demand Connctiond Route Helper
|
| | onedrivesettingsyncprovider.dll | 6.2.10240.16431 | OneDrive Setting Sync
|
| | onex.dll | 6.2.10240.16384 | IEEE 802.1X supplicant library
|
| | onexui.dll | 6.2.10240.16384 | IEEE 802.1X supplicant UI library
|
| | oobefldr.dll | 6.2.10240.16384 | Getting Started
|
| | opcservices.dll | 6.2.10240.16384 | Native Code OPC Services Library
|
| | opencl.dll | 1.2.11.0 | OpenCL Client DLL
|
| | opengl32.dll | 6.2.10240.16384 | OpenGL Client DLL
|
| | osbaseln.dll | 6.2.10240.16384 | Service Reporting API
|
| | osksupport.dll | 6.2.10240.16384 | Microsoft On-Screen Keyboard Support Utilities
|
| | osuninst.dll | 6.2.10240.16384 | Uninstall Interface
|
| | p2p.dll | 6.2.10240.16384 | Peer-to-Peer Grouping
|
| | p2pgraph.dll | 6.2.10240.16384 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 6.2.10240.16384 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 6.2.10240.16384 | Object Packager2
|
| | packagestateroaming.dll | 6.2.10240.16461 | Package State Roaming
|
| | panmap.dll | 6.2.10240.16384 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 6.2.10240.16384 | Auto Enrollment DLL
|
| | pcacli.dll | 6.2.10240.16384 | Program Compatibility Assistant Client Module
|
| | pcaui.dll | 6.2.10240.16384 | Program Compatibility Assistant User Interface Module
|
| | pcpksp.dll | 6.2.10240.16384 | Microsoft Platform Key Storage Provider for Platform Crypto Provider
|
| | pcptpm12.dll | 6.2.10240.16384 | Microsoft Platform Crypto Provider for Trusted Platform Module 1.2
|
| | pcwum.dll | 6.2.10240.16384 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 6.2.10240.16384 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 6.2.10240.16384 | PDH UI
|
| | peerdist.dll | 6.2.10240.16384 | BranchCache Client Library
|
| | peerdistsh.dll | 6.2.10240.16384 | BranchCache Netshell Helper
|
| | perfctrs.dll | 6.2.10240.16384 | Performance Counters
|
| | perfdisk.dll | 6.2.10240.16384 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 6.2.10240.16384 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 6.2.10240.16384 | Windows System Performance Objects DLL
|
| | perfproc.dll | 6.2.10240.16384 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 6.2.10240.16384 | Windows Remote Desktop Services Performance Objects
|
| | personax.dll | 6.2.10240.16384 | PersonaX
|
| | phonecallhistoryapis.dll | 6.2.10240.16384 | DLL for PhoneCallHistoryRT
|
| | phoneutil.dll | 6.2.10240.16384 | Phone utilities
|
| | phoneutilres.dll | 6.2.10240.16384 | Resource DLL for Phone utilities
|
| | photometadatahandler.dll | 6.2.10240.16384 | Photo Metadata Handler
|
| | photowiz.dll | 6.2.10240.16384 | Photo Printing Wizard
|
| | pid.dll | 6.2.10240.16384 | Microsoft PID
|
| | pidgenx.dll | 6.2.10240.16384 | Pid Generation
|
| | pifmgr.dll | 6.2.10240.16384 | Windows NT PIF Manager Icon Resources Library
|
| | pimindexmaintenanceclient.dll | 6.2.10240.16384 | Client dll for Pim Index Maintenance
|
| | pimstore.dll | 6.2.10240.16384 | POOM
|
| | pku2u.dll | 6.2.10240.16384 | Pku2u Security Package
|
| | pla.dll | 6.2.10240.16384 | Performance Logs & Alerts
|
| | playlistfolder.dll | 6.2.10240.16384 | Playlist Folder
|
| | playsndsrv.dll | 6.2.10240.16384 | PlaySound Service
|
| | playtodevice.dll | 12.0.10240.16384 | PLAYTODEVICE DLL
|
| | playtomanager.dll | 6.2.10240.16412 | Microsoft Windows PlayTo Manager
|
| | playtomenu.dll | 12.0.10240.16384 | Cast to Device Menu DLL
|
| | playtoreceiver.dll | 12.0.10240.16384 | DLNA DMR DLL
|
| | playtostatusprovider.dll | 6.2.10240.16384 | PlayTo Status Provider Dll
|
| | pngfilt.dll | 11.0.10240.16384 | IE PNG plugin image decoder
|
| | pnrpnsp.dll | 6.2.10240.16384 | PNRP Name Space Provider
|
| | policymanager.dll | 6.2.10240.16384 | Policy Manager DLL
|
| | polstore.dll | 6.2.10240.16384 | Policy Storage dll
|
| | portabledeviceapi.dll | 6.2.10240.16384 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 6.2.10240.16384 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 6.2.10240.16384 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 6.2.10240.16384 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 6.2.10240.16384 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 6.2.10240.16384 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 6.2.10240.16384 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 6.2.10240.16384 | Windows Portable Device WMDRM Component
|
| | posyncservices.dll | 6.2.10240.16384 | Change Tracking
|
| | pots.dll | 6.2.10240.16384 | Power Troubleshooter
|
| | powercpl.dll | 6.2.10240.16384 | Power Options Control Panel
|
| | powrprof.dll | 6.2.10240.16384 | Power Profile Helper DLL
|
| | presentationcffrasterizernative_v0300.dll | 3.0.6920.8674 | WinFX OpenType/CFF Rasterizer
|
| | presentationhostproxy.dll | 6.2.10240.16384 | Windows Presentation Foundation Host Proxy
|
| | presentationnative_v0300.dll | 3.0.6920.8674 | PresentationNative_v0300.dll
|
| | prflbmsg.dll | 6.2.10240.16384 | Perflib Event Messages
|
| | printconfig.dll | 0.3.10240.16384 | PrintConfig User Interface
|
| | printdialogs.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | printplatformconfig.dll | 6.2.10240.16384 | Legacy Print Platform Adapter
|
| | printui.dll | 6.2.10240.16384 | Printer Settings User Interface
|
| | prncache.dll | 6.2.10240.16384 | Print UI Cache
|
| | prnfldr.dll | 6.2.10240.16384 | prnfldr dll
|
| | prnntfy.dll | 6.2.10240.16384 | prnntfy DLL
|
| | prntvpt.dll | 6.2.10240.16384 | Print Ticket Services Module
|
| | profapi.dll | 6.2.10240.16384 | User Profile Basic API
|
| | profext.dll | 6.2.10240.16384 | profext
|
| | propsys.dll | 7.0.10240.16384 | Microsoft Property System
|
| | provcore.dll | 6.2.10240.16384 | Microsoft Wireless Provisioning Core
|
| | provsvc.dll | 6.2.10240.16384 | Windows HomeGroup
|
| | provthrd.dll | 6.2.10240.16384 | WMI Provider Thread & Log Library
|
| | proximitycommon.dll | 6.2.10240.16384 | Proximity Common Implementation
|
| | proximitycommonpal.dll | 6.2.10240.16384 | Proximity Common PAL
|
| | proximityrtapipal.dll | 6.2.10240.16384 | Proximity WinRT API PAL
|
| | prvdmofcomp.dll | 6.2.10240.16384 | WMI
|
| | psapi.dll | 6.2.10240.16384 | Process Status Helper
|
| | pshed.dll | 6.2.10240.16384 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 6.2.10240.16384 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | psktwmcp.dll | 1.0.1883.507 | Application Interface DLL
|
| | psktwmcp64.dll | 1.0.1883.507 | Application Interface DLL
|
| | psmodulediscoveryprovider.dll | 6.2.10240.16384 | WMI
|
| | pstorec.dll | 6.2.10240.16384 | Deprecated Protected Storage COM interfaces
|
| | puiapi.dll | 6.2.10240.16384 | puiapi DLL
|
| | puiobj.dll | 6.2.10240.16384 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 6.2.10240.16384 | pwrshplugin.dll
|
| | qasf.dll | 12.0.10240.16384 | DirectShow ASF Support
|
| | qcap.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | qdv.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | qdvd.dll | 6.2.10240.16384 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 6.2.10240.16384 | DirectShow Editing.
|
| | qedwipes.dll | 6.2.10240.16384 | DirectShow Editing SMPTE Wipes
|
| | quartz.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | query.dll | 6.2.10240.16384 | Content Index Utility DLL
|
| | qwave.dll | 6.2.10240.16384 | Windows NT
|
| | racengn.dll | 6.2.10240.16384 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 6.2.10240.16384 | Remote Assistance Contact List
|
| | radardt.dll | 6.2.10240.16384 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 6.2.10240.16384 | Microsoft Windows Resource Exhaustion Resolver
|
| | radcui.dll | 6.2.10240.16384 | RemoteApp and Desktop Connection UI Component
|
| | rasadhlp.dll | 6.2.10240.16384 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 6.2.10240.16384 | Remote Access API
|
| | rascfg.dll | 6.2.10240.16384 | RAS Configuration Objects
|
| | raschap.dll | 6.2.10240.16384 | Remote Access PPP CHAP
|
| | raschapext.dll | 6.2.10240.16384 | Windows Extension library for raschap
|
| | rasctrs.dll | 6.2.10240.16384 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 6.2.10240.16384 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 6.2.10240.16384 | Remote Access Common Dialog API
|
| | rasgcw.dll | 6.2.10240.16384 | RAS Wizard Pages
|
| | rasman.dll | 6.2.10240.16384 | Remote Access Connection Manager
|
| | rasmontr.dll | 6.2.10240.16384 | RAS Monitor DLL
|
| | rasmxs.dll | 6.2.10240.16384 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 6.2.10240.16384 | RAS PLAP Credential Provider
|
| | rasppp.dll | 6.2.10240.16384 | Remote Access PPP
|
| | rasser.dll | 6.2.10240.16384 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 6.2.10240.16384 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 6.2.10240.16384 | Remote Access PPP EAP-TLS
|
| | rastlsext.dll | 6.2.10240.16384 | Windows Extension library for rastls
|
| | rdpcore.dll | 6.2.10240.16384 | RDP Core DLL
|
| | rdpencom.dll | 6.2.10240.16384 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 6.2.10240.16384 | RDP Audio Endpoint
|
| | rdpsaps.dll | 6.2.10240.16384 | RDP Session Agent Proxy Stub
|
| | rdvidcrl.dll | 6.2.10240.16384 | Remote Desktop Services Client for Microsoft Online Services
|
| | rdvvmtransport.dll | 6.2.10240.16384 | RdvVmTransport EndPoints
|
| | reagent.dll | 6.2.10240.16431 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 6.2.10240.16384 | Registry Configuration APIs
|
| | regctrl.dll | 6.2.10240.16384 | RegCtrl
|
| | reinfo.dll | 6.2.10240.16431 | Microsoft Windows Recovery Info DLL
|
| | remoteaudioendpoint.dll | 6.2.10240.16384 | Remote Audio Endpoint
|
| | remotenaturallanguage.dll | 1.0.0.1 | Speech Client Communication To Backend Speech Services Library.
|
| | remotepg.dll | 6.2.10240.16384 | Remote Sessions CPL Extension
|
| | removedevicecontexthandler.dll | 6.2.10240.16384 | Devices & Printers Remove Device Context Menu Handler
|
| | removedeviceelevated.dll | 6.2.10240.16384 | RemoveDeviceElevated Proxy Dll
|
| | resampledmo.dll | 6.2.10240.16384 | Windows Media Resampler
|
| | resutils.dll | 6.2.10240.16384 | Microsoft Cluster Resource Utility DLL
|
| | rfxvmt.dll | 6.2.10240.16384 | Microsoft RemoteFX VM Transport
|
| | rgb9rast.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1231 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 6.2.10240.16384 | Wrapper Dll for Richedit 1.0
|
| | rmclient.dll | 6.2.10240.16384 | Resource Manager Client
|
| | rnr20.dll | 6.2.10240.16384 | Windows Socket2 NameSpace DLL
|
| | rometadata.dll | 4.6.79.0 | Microsoft MetaData Library
|
| | rpchttp.dll | 6.2.10240.16384 | RPC HTTP DLL
|
| | rpcns4.dll | 6.2.10240.16384 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 6.2.10240.16384 | RPC Netshell Helper
|
| | rpcrt4.dll | 6.2.10240.16412 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 6.2.10240.16384 | Remote RPC Extension
|
| | rsaenh.dll | 6.2.10240.16384 | Microsoft Enhanced Cryptographic Provider
|
| | rscricon.dll | 1.10.0.0 | Realtek Card Reader Icon Dll
|
| | rshx32.dll | 6.2.10240.16384 | Security Shell Extension
|
| | rstrtmgr.dll | 6.2.10240.16384 | Restart Manager
|
| | rtffilt.dll | 2008.0.10240.16384 | RTF Filter
|
| | rtm.dll | 6.2.10240.16384 | Routing Table Manager
|
| | rtmediaframe.dll | 6.2.10240.16384 | Windows Runtime MediaFrame DLL
|
| | rtutils.dll | 6.2.10240.16384 | Routing Utilities
|
| | rtworkq.dll | 12.0.10240.16384 | Realtime WorkQueue DLL
|
| | samcli.dll | 6.2.10240.16384 | Security Accounts Manager Client DLL
|
| | samlib.dll | 6.2.10240.16384 | SAM Library DLL
|
| | sas.dll | 6.2.10240.16384 | WinLogon Software SAS Library
|
| | sbe.dll | 6.2.10240.16384 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.10240.16384 | Stream Buffer IO DLL
|
| | sberes.dll | 6.2.10240.16384 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 6.2.10240.16384 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 6.2.10240.16384 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 6.2.10240.16384 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 6.2.10240.16384 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 6.2.10240.16384 | TLS / SSL Security Provider
|
| | schedcli.dll | 6.2.10240.16384 | Scheduler Service Client DLL
|
| | scksp.dll | 6.2.10240.16384 | Microsoft Smart Card Key Storage Provider
|
| | scripto.dll | 6.6.10240.16384 | Microsoft ScriptO
|
| | scrobj.dll | 5.812.10240.16384 | Windows ® Script Component Runtime
|
| | scrptadm.dll | 6.2.10240.16384 | Script Adm Extension
|
| | scrrun.dll | 5.812.10240.16384 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 6.2.10240.16384 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 6.2.10240.16384 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 6.2.10240.16384 | NPS SDO Helper Component
|
| | search.protocolhandler.mapi2.dll | 7.0.10240.16384 | Microsoft Search Protocol Handler for MAPI2
|
| | searchfolder.dll | 6.2.10240.16405 | SearchFolder
|
| | sechost.dll | 6.2.10240.16384 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 6.2.10240.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 6.2.10240.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 6.2.10240.16384 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 6.2.10240.16384 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | security.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | sendmail.dll | 6.2.10240.16405 | Send Mail
|
| | sensapi.dll | 6.2.10240.16384 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 6.2.10240.16390 | Sensor API
|
| | sensorscpl.dll | 6.2.10240.16384 | Open Location and Other Sensors
|
| | sensorsnativeapi.dll | 6.2.10240.16384 | Sensors Native API
|
| | sensorsnativeapi.v2.dll | 6.2.10240.16412 | Sensors Native API (V2 stack)
|
| | sensorsutilsv2.dll | 6.2.10240.16384 | Sensors v2 Utilities DLL
|
| | serialui.dll | 6.2.10240.16384 | Serial Port Property Pages
|
| | serwvdrv.dll | 6.2.10240.16384 | Unimodem Serial Wave driver
|
| | sessenv.dll | 6.2.10240.16384 | Remote Desktop Configuration service
|
| | settingmonitor.dll | 6.2.10240.16384 | Setting Synchronization Change Monitor
|
| | settingsync.dll | 6.2.10240.16485 | Setting Synchronization
|
| | settingsynccore.dll | 6.2.10240.16384 | Setting Synchronization Core
|
| | settingsyncpolicy.dll | 6.2.10240.16384 | SettingSync Policy
|
| | setupapi.dll | 6.2.10240.16384 | Windows Setup API
|
| | setupcln.dll | 6.2.10240.16384 | Setup Files Cleanup
|
| | sfc.dll | 6.2.10240.16384 | Windows File Protection
|
| | sfc_os.dll | 6.2.10240.16384 | Windows File Protection
|
| | sfcom.dll | 3.0.0.11 | SFCOM.DLL
|
| | shacct.dll | 6.2.10240.16485 | Shell Accounts Classes
|
| | sharehost.dll | 6.2.10240.16384 | ShareHost
|
| | shcore.dll | 6.2.10240.16384 | SHCORE
|
| | shdocvw.dll | 6.2.10240.16384 | Shell Doc Object and Control Library
|
| | shell32.dll | 6.2.10240.16463 | Windows Shell Common Dll
|
| | shellstyle.dll | 6.2.10240.16384 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 6.2.10240.16384 | Shell Folder Service
|
| | shgina.dll | 6.2.10240.16384 | Windows Shell User Logon
|
| | shimeng.dll | 6.2.10240.16384 | Shim Engine DLL
|
| | shimgvw.dll | 6.2.10240.16384 | Photo Gallery Viewer
|
| | shlwapi.dll | 6.2.10240.16384 | Shell Light-weight Utility Library
|
| | shpafact.dll | 6.2.10240.16384 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 6.2.10240.16384 | Shell setup helper
|
| | shsvcs.dll | 6.2.10240.16384 | Windows Shell Services Dll
|
| | shunimpl.dll | 6.2.10240.16384 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 6.2.10240.16384 | Windows Shell Web Services
|
| | signdrv.dll | 6.2.10240.16384 | WMI provider for Signed Drivers
|
| | simauth.dll | 6.2.10240.16384 | EAP SIM run-time dll
|
| | simcfg.dll | 6.2.10240.16384 | EAP SIM config dll
|
| | sisbkup.dll | 6.2.10240.16384 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 6.2.10240.16384 | Software Licensing Client Dll
|
| | slcext.dll | 6.2.10240.16384 | Software Licensing Client Extension Dll
|
| | slwga.dll | 6.2.10240.16384 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 6.2.10240.16384 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | smphost.dll | 6.2.10240.16384 | Storage Management Provider (SMP) host service
|
| | sndvolsso.dll | 6.2.10240.16384 | SCA Volume
|
| | snmpapi.dll | 6.2.10240.16384 | SNMP Utility Library
|
| | softkbd.dll | 6.2.10240.16384 | Soft Keyboard Server and Tip
|
| | softpub.dll | 6.2.10240.16384 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 6.2.10240.16384 | Sort Version Server 2003
|
| | sortwindows61.dll | 6.2.10240.16384 | SortWindows61 Dll
|
| | sortwindows6compat.dll | 6.2.10240.16384 | Sort Version Windows 6.0
|
| | spbcd.dll | 6.2.10240.16393 | BCD Sysprep Plugin
|
| | spfileq.dll | 6.2.10240.16384 | Windows SPFILEQ
|
| | spinf.dll | 6.2.10240.16384 | Windows SPINF
|
| | spnet.dll | 6.2.10240.16384 | Net Sysprep Plugin
|
| | spopk.dll | 6.2.10240.16384 | OPK Sysprep Plugin
|
| | spp.dll | 6.2.10240.16384 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 6.2.10240.16384 | Software Licensing Client Dll
|
| | sppcext.dll | 6.2.10240.16384 | Software Protection Platform Client Extension Dll
|
| | sppinst.dll | 6.2.10240.16384 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 6.2.10240.16384 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 6.2.10240.16384 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 6.2.10240.16384 | Setup Wizard Framework
|
| | spwizimg.dll | 6.2.10240.16384 | Setup Wizard Framework Resources
|
| | spwizres.dll | 6.2.10240.16384 | Setup Wizard Framework Resources
|
| | spwmp.dll | 6.2.10240.16384 | Windows Media Player System Preparation DLL
|
| | sqlcecompact40.dll | 4.0.8275.1 | Database Repair Tool (32-bit)
|
| | sqlceoledb40.dll | 4.0.10240.1 | OLEDB Provider (32-bit)
|
| | sqlceqp40.dll | 4.0.10240.1 | Query Processor (32-bit)
|
| | sqlcese40.dll | 4.0.10240.1 | Storage Engine (32-bit)
|
| | sqloledb.dll | 6.2.10240.16384 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 6.2.10240.16384 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 2000.80.2039.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 2000.80.2040.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 6.2.10240.16384 | XML extensions for SQL Server
|
| | sqmapi.dll | 6.2.10240.16384 | SQM Client
|
| | srchadmin.dll | 7.0.10240.16384 | Indexing Options
|
| | srclient.dll | 6.2.10240.16384 | Microsoft® Windows System Restore Client Library
|
| | srh.dll | 6.2.10240.16384 | Screen Reader Helper DLL
|
| | srhinproc.dll | 6.2.10240.16384 | Screen Reader Helper DLL
|
| | srm.dll | 6.2.10240.16384 | Microsoft® File Server Resource Manager Common Library
|
| | srm_ps.dll | 6.2.10240.16384 | Microsoft® FSRM internal proxy/stub
|
| | srmclient.dll | 6.2.10240.16384 | Microsoft® File Server Resource Management Client Extensions
|
| | srmlib.dll | 6.2.10240.16384 | Microsoft (R) File Server Resource Management Interop Assembly
|
| | srmscan.dll | 6.2.10240.16384 | Microsoft® File Server Storage Reports Scan Engine
|
| | srmshell.dll | 6.2.10240.16384 | Microsoft® File Server Resource Management Shell Extension
|
| | srmstormod.dll | 6.2.10240.16384 | Microsoft® File Server Resource Management Office Parser
|
| | srmtrace.dll | 6.2.10240.16384 | Microsoft® File Server Resource Management Tracing Library
|
| | srpapi.dll | 6.2.10240.16384 | SRP APIs Dll
|
| | srpuxnativesnapin.dll | 6.2.10240.16384 | Application Control Policies Group Policy Editor Extension
|
| | srumapi.dll | 6.2.10240.16384 | System Resource Usage Monitor API
|
| | srumsvc.dll | 6.2.10240.16391 | System Resource Usage Monitor Service
|
| | srvcli.dll | 6.2.10240.16384 | Server Service Client DLL
|
| | sscore.dll | 6.2.10240.16384 | Server Service Core DLL
|
| | ssdpapi.dll | 6.2.10240.16384 | SSDP Client API DLL
|
| | sspicli.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | ssshim.dll | 6.2.10240.16384 | Windows Componentization Platform Servicing API
|
| | startupscan.dll | 6.2.10240.16384 | Startup scan task DLL
|
| | staterepository.core.dll | 6.2.10240.16384 | StateRepository Core
|
| | stclient.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Client
|
| | sti.dll | 6.2.10240.16384 | Still Image Devices client DLL
|
| | stobject.dll | 6.2.10240.16405 | Systray shell service object
|
| | storage.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | storagecontexthandler.dll | 6.2.10240.16384 | Device Center Storage Context Menu Handler
|
| | storagewmi.dll | 6.2.10240.16384 | WMI Provider for Storage Management
|
| | storagewmi_passthru.dll | 6.2.10240.16384 | WMI PassThru Provider for Storage Management
|
| | storprop.dll | 6.2.10240.16384 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.10240.16384 | Structured Query
|
| | sud.dll | 6.2.10240.16384 | SUD Control Panel
|
| | suplcsps.dll | 6.2.10240.16384 | Windows Supl CSP implementation
|
| | sxproxy.dll | 6.2.10240.16384 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 6.2.10240.16384 | Fusion 2.5
|
| | sxshared.dll | 6.2.10240.16384 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 6.2.10240.16384 | Sxs Store DLL
|
| | synccenter.dll | 6.2.10240.16384 | Microsoft Sync Center
|
| | synceng.dll | 6.2.10240.16384 | Windows Briefcase Engine
|
| | synchostps.dll | 6.2.10240.16384 | Proxystub for sync host
|
| | syncinfrastructure.dll | 6.2.10240.16384 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 6.2.10240.16384 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncreg.dll | 2007.94.10240.16384 | Microsoft Synchronization Framework Registration
|
| | syncsettings.dll | 6.2.10240.16384 | Sync Settings
|
| | syncui.dll | 6.2.10240.16384 | Windows Briefcase
|
| | syssetup.dll | 6.2.10240.16384 | Windows NT System Setup
|
| | systemcpl.dll | 6.2.10240.16389 | My System CPL
|
| | systemeventsbrokerclient.dll | 6.2.10240.16384 | system Events Broker Client Library
|
| | t2embed.dll | 6.2.10240.16384 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 6.2.10240.16384 | Microsoft TAPI3
|
| | tapi32.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 6.2.10240.16384 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 6.2.10240.16384 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 6.2.10240.16384 | Task Scheduler COM API
|
| | taskschdps.dll | 6.2.10240.16384 | Task Scheduler Interfaces Proxy
|
| | tbauth.dll | 6.2.10240.16384 | TBAuth protocol handler
|
| | tbs.dll | 6.2.10240.16384 | TBS
|
| | tcpipcfg.dll | 6.2.10240.16384 | Network Configuration Objects
|
| | tcpmib.dll | 6.2.10240.16384 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 6.2.10240.16384 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 6.2.10240.16384 | Event Trace Helper Library
|
| | termmgr.dll | 6.2.10240.16384 | Microsoft TAPI3 Terminal Manager
|
| | tetheringclient.dll | 6.2.10240.16431 | Tethering Client
|
| | textinputframework.dll | |
|
| | themecpl.dll | 6.2.10240.16384 | Personalization CPL
|
| | themeui.dll | 6.2.10240.16384 | Windows Theme API
|
| | threadpoolwinrt.dll | 6.2.10240.16384 | Windows WinRT Threadpool
|
| | thumbcache.dll | 6.2.10240.16384 | Microsoft Thumbnail Cache
|
| | timebrokerclient.dll | 6.2.10240.16384 | Time Broker Client Library
|
| | timedatemuicallback.dll | 6.2.10240.16384 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 6.2.10240.16384 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tokenbinding.dll | 6.2.10240.16384 | Token Binding Protocol
|
| | tokenbroker.dll | 6.2.10240.16384 | Token Broker
|
| | tokenbrokerui.dll | 6.2.10240.16384 | Token Broker UI
|
| | tpmcertresources.dll | 6.2.10240.16384 | TpmCertResources
|
| | tpmcompc.dll | 6.2.10240.16384 | Computer Chooser Dialog
|
| | tpmcoreprovisioning.dll | 6.2.10240.16384 | TPM Core Provisioning Library
|
| | tquery.dll | 7.0.10240.16431 | Microsoft Tripoli Query
|
| | traffic.dll | 6.2.10240.16384 | Microsoft Traffic Control 1.0 DLL
|
| | tsbyuv.dll | 6.2.10240.16384 | Toshiba Video Codec
|
| | tschannel.dll | 6.2.10240.16384 | Task Scheduler Proxy
|
| | tsgqec.dll | 6.2.10240.16384 | RD Gateway QEC
|
| | tsmf.dll | 6.2.10240.16384 | RDP MF Plugin
|
| | tspkg.dll | 6.2.10240.16384 | Web Service Security Package
|
| | tsworkspace.dll | 6.2.10240.16384 | RemoteApp and Desktop Connection Component
|
| | ttlsauth.dll | 6.2.10240.16384 | EAP TTLS run-time dll
|
| | ttlscfg.dll | 6.2.10240.16384 | EAP TTLS configuration dll
|
| | ttlsext.dll | 6.2.10240.16384 | Windows Extension library for EAP TTLS
|
| | tvratings.dll | 6.2.10240.16384 | Module for managing TV ratings
|
| | twext.dll | 6.2.10240.16384 | Previous Versions property page
|
| | twinapi.appcore.dll | 6.2.10240.16397 | twinapi.appcore
|
| | twinapi.dll | 6.2.10240.16384 | twinapi
|
| | twinui.appcore.dll | 6.2.10240.16412 | TWINUI.APPCORE
|
| | twinui.dll | 6.2.10240.16412 | TWINUI
|
| | txflog.dll | 2001.12.10941.16384 | COM+
|
| | txfw32.dll | 6.2.10240.16384 | TxF Win32 DLL
|
| | typelib.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | tzres.dll | 6.2.10240.16384 | Time Zones resource DLL
|
| | ucmhc.dll | 6.2.10240.16384 | UCM Helper Class
|
| | ucrtbase.dll | 6.2.10240.16384 | Microsoft® C Runtime Library
|
| | udhisapi.dll | 6.2.10240.16384 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 6.2.10240.16384 | eXfat Utility DLL
|
| | ufat.dll | 6.2.10240.16384 | FAT Utility DLL
|
| | uianimation.dll | 6.2.10240.16384 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.2.10240.16431 | Microsoft UI Automation Core
|
| | uiautomationcoreres.dll | 7.2.10240.16384 | Microsoft UI Automation Core Resource
|
| | uicom.dll | 6.2.10240.16384 | Add/Remove Modems
|
| | uireng.dll | 6.2.10240.16384 | UI Recording Engine Library
|
| | uiribbon.dll | 6.2.10240.16393 | Windows Ribbon Framework
|
| | uiribbonres.dll | 6.2.10240.16393 | Windows Ribbon Framework Resources
|
| | ulib.dll | 6.2.10240.16384 | File Utilities Support DLL
|
| | umdmxfrm.dll | 6.2.10240.16384 | Unimodem Tranform Module
|
| | unimdmat.dll | 6.2.10240.16384 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 6.2.10240.16384 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | unistore.dll | 6.2.10240.16401 | Unified Store
|
| | untfs.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | updatepolicy.dll | 6.2.10240.16384 | Update Policy Reader
|
| | upnp.dll | 6.2.10240.16384 | UPnP Control Point API
|
| | upnphost.dll | 6.2.10240.16384 | UPnP Device Host
|
| | urefs.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | urefsv1.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | ureg.dll | 6.2.10240.16384 | Registry Utility DLL
|
| | url.dll | 11.0.10240.16384 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 11.0.10240.16391 | OLE32 Extensions for Win32
|
| | usbceip.dll | 6.2.10240.16384 | USBCEIP Task
|
| | usbperf.dll | 6.2.10240.16384 | USB Performance Objects DLL
|
| | usbui.dll | 6.2.10240.16384 | USB UI Dll
|
| | user32.dll | 6.2.10240.16384 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 6.2.10240.16384 | UserAccountControlSettings
|
| | usercpl.dll | 6.2.10240.16384 | User control panel
|
| | userdataaccessres.dll | 6.2.10240.16384 | Resource DLL for the UserDataAccess stack
|
| | userdataaccountapis.dll | 6.2.10240.16384 | DLL for UserDataAccountsRT
|
| | userdatalanguageutil.dll | 6.2.10240.16384 | Language-related helper functions for user data
|
| | userdataplatformhelperutil.dll | 6.2.10240.16384 | Platform Utilities for data access
|
| | userdatatimeutil.dll | 6.2.10240.16384 | Time-related helper functions for user data
|
| | userdatatypehelperutil.dll | 6.2.10240.16384 | Type Utilities for data access
|
| | userdeviceregistration.dll | 6.2.10240.16384 | AAD User Device Registration WinRT
|
| | userdeviceregistration.ngc.dll | 6.2.10240.16384 | AD/AAD User Device Registration WinRT
|
| | userenv.dll | 6.2.10240.16384 | Userenv
|
| | userinitext.dll | 6.2.10240.16384 | UserInit Utility Extension DLL
|
| | userlanguageprofilecallback.dll | 6.2.10240.16384 | MUI Callback for User Language profile changed
|
| | userlanguagescpl.dll | 6.2.10240.16384 | My Languages Configuration Control Panel
|
| | usermgrcli.dll | 6.2.10240.16384 | UserMgr API DLL
|
| | usermgrproxy.dll | 6.2.10240.16431 | UserMgrProxy
|
| | usp10.dll | 6.2.10240.16384 | Uniscribe Unicode script processor
|
| | ustprov.dll | 6.2.10240.16384 | User State WMI Provider
|
| | utildll.dll | 6.2.10240.16384 | WinStation utility support DLL
|
| | uudf.dll | 6.2.10240.16384 | UDF Utility DLL
|
| | uxinit.dll | 6.2.10240.16384 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 6.2.10240.16384 | Setup Wizard Framework
|
| | uxlibres.dll | 6.2.10240.16384 | UXLib Resources
|
| | uxtheme.dll | 6.2.10240.16397 | Microsoft UxTheme Library
|
| | van.dll | 6.2.10240.16384 | View Available Networks
|
| | vault.dll | 6.2.10240.16384 | Windows vault Control Panel
|
| | vaultcli.dll | 6.2.10240.16384 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbscript.dll | 5.812.10240.16485 | Microsoft ® VBScript
|
| | vcamp110.dll | 11.0.51106.1 | Microsoft® C++ AMP Runtime
|
| | vcardparser.dll | 6.2.10240.16384 | Supports the parsing of VCard and ICal formatted data
|
| | vccorlib110.dll | 11.0.51106.1 | Microsoft ® VC WinRT core library
|
| | vccorlib120.dll | 12.0.21005.1 | Microsoft ® VC WinRT core library
|
| | vcomp100.dll | 10.0.40219.325 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp110.dll | 11.0.51106.1 | Microsoft® C/C++ OpenMP Runtime
|
| | vdmdbg.dll | 6.2.10240.16384 | VDMDBG.DLL
|
| | vds_ps.dll | 6.2.10240.16384 | Microsoft® Virtual Disk Service proxy/stub
|
| | vedatalayerhelpers.dll | 6.2.10240.16425 | Visual Element DataLayer Helpers
|
| | veeventdispatcher.dll | 6.2.10240.16425 | Visual Element Event dispatcher
|
| | verifier.dll | 6.2.10240.16384 | Standard application verifier provider dll
|
| | version.dll | 6.2.10240.16384 | Version Checking and File Installation Libraries
|
| | vfwwdm32.dll | 6.2.10240.16384 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 6.2.10240.16384 | Windows Media Resizer
|
| | virtdisk.dll | 6.2.10240.16384 | Virtual Disk API DLL
|
| | voiceactivationmanager.dll | 6.2.10240.16412 | Windows Voice Activation Manager
|
| | vpnikeapi.dll | 6.2.10240.16384 | VPN IKE API's
|
| | vscmgrps.dll | 6.2.10240.16384 | Microsoft Virtual Smart Card Manager Proxy/Stub
|
| | vss_ps.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 6.2.10240.16384 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 6.2.10240.16384 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 6.2.10240.16384 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 6.2.10240.16384 | Microsoft Windows Contacts Sync Provider
|
| | walletbackgroundserviceproxy.dll | 6.2.10240.16384 | Wallet Background Proxy
|
| | walletproxy.dll | 6.2.10240.16384 | Wallet proxy
|
| | wavemsp.dll | 6.2.10240.16384 | Microsoft Wave MSP
|
| | wbemcomn.dll | 6.2.10240.16384 | WMI
|
| | wcmapi.dll | 6.2.10240.16384 | Windows Connection Manager Client API
|
| | wcnapi.dll | 6.2.10240.16461 | Windows Connect Now - API Helper DLL
|
| | wcnwiz.dll | 6.2.10240.16461 | Windows Connect Now Wizards
|
| | wcspluginservice.dll | 6.2.10240.16384 | WcsPlugInService DLL
|
| | wdc.dll | 6.2.10240.16384 | Performance Monitor
|
| | wdi.dll | 6.2.10240.16384 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 6.2.10240.16384 | Microsoft Digest Access
|
| | wdscore.dll | 6.2.10240.16384 | Panther Engine Module
|
| | webcamui.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | webcheck.dll | 11.0.10240.16384 | Web Site Monitor
|
| | webclnt.dll | 6.2.10240.16384 | Web DAV Service DLL
|
| | webio.dll | 6.2.10240.16384 | Web Transfer Protocols API
|
| | webservices.dll | 6.2.10240.16384 | Windows Web Services Runtime
|
| | websocket.dll | 6.2.10240.16384 | Web Socket API
|
| | wecapi.dll | 6.2.10240.16384 | Event Collector Configuration API
|
| | wer.dll | 6.2.10240.16384 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 6.2.10240.16384 | WER Diagnostic Controller
|
| | weretw.dll | |
|
| | werui.dll | 6.2.10240.16384 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 6.2.10240.16384 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 6.2.10240.16384 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 6.2.10240.16384 | Windows Firewall GPO Helper dll
|
| | wfdprov.dll | 6.2.10240.16461 | Private WPS provisioning API DLL for Wi-Fi Direct
|
| | wfhc.dll | 6.2.10240.16384 | Windows Firewall Helper Class
|
| | whhelper.dll | 6.2.10240.16384 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 6.2.10240.16384 | WIA Automation Layer
|
| | wiadefui.dll | 6.2.10240.16384 | WIA Scanner Default UI
|
| | wiadss.dll | 6.2.10240.16384 | WIA TWAIN compatibility layer
|
| | wiascanprofiles.dll | 6.2.10240.16384 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 6.2.10240.16384 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 6.2.10240.16384 | WIA Tracing
|
| | wifidisplay.dll | 6.2.10240.16384 | Wi-Fi Display DLL
|
| | wimgapi.dll | 6.2.10240.16401 | Windows Imaging Library
|
| | winbio.dll | 6.2.10240.16384 | Windows Biometrics Client API
|
| | winbioext.dll | 6.2.10240.16384 | Windows Biometrics Client Extension API
|
| | winbrand.dll | 6.2.10240.16384 | Windows Branding Resources
|
| | wincorlib.dll | 6.2.10240.16384 | Microsoft Windows ® WinRT core library
|
| | wincredprovider.dll | 6.2.10240.16384 | wincredprovider DLL
|
| | windows.accountscontrol.dll | 6.2.10240.16384 | Windows Accounts Control
|
| | windows.applicationmodel.background.systemeventsbroker.dll | 6.2.10240.16384 | Windows Background System Events Broker API Server
|
| | windows.applicationmodel.background.timebroker.dll | 6.2.10240.16384 | Windows Background Time Broker API Server
|
| | windows.applicationmodel.core.dll | 6.2.10240.16384 | Windows Application Model Core API
|
| | windows.applicationmodel.dll | 6.2.10240.16384 | Windows ApplicationModel API Server
|
| | windows.applicationmodel.lockscreen.dll | 6.2.10240.16425 | Windows Lock Application Framework DLL
|
| | windows.applicationmodel.store.dll | 6.2.10240.16431 | Windows Store Runtime DLL
|
| | windows.applicationmodel.store.testingframework.dll | 6.2.10240.16431 | Windows Store Testing Framework Runtime DLL
|
| | windows.applicationmodel.wallet.dll | 6.2.10240.16384 | Windows ApplicationModel Wallet Runtime DLL
|
| | windows.data.pdf.dll | 6.2.10240.16384 | PDF WinRT APIs
|
| | windows.devices.alljoyn.dll | 6.2.10240.16384 | Windows.Devices.AllJoyn DLL
|
| | windows.devices.background.dll | 6.2.10240.16384 | Windows.Devices.Background
|
| | windows.devices.background.ps.dll | 6.2.10240.16384 | Windows.Devices.Background Interface Proxy
|
| | windows.devices.bluetooth.dll | 6.2.10240.16397 | Windows.Devices.Bluetooth DLL
|
| | windows.devices.custom.dll | 6.2.10240.16384 | Windows.Devices.Custom
|
| | windows.devices.custom.ps.dll | 6.2.10240.16384 | Windows.Devices.Custom Interface Proxy
|
| | windows.devices.enumeration.dll | 6.2.10240.16384 | Windows.Devices.Enumeration
|
| | windows.devices.humaninterfacedevice.dll | 6.2.10240.16384 | Windows.Devices.HumanInterfaceDevice DLL
|
| | windows.devices.lights.dll | 6.2.10240.16384 | Windows Runtime Lights DLL
|
| | windows.devices.midi.dll | 6.2.10240.16384 | Windows Runtime MIDI Device server DLL
|
| | windows.devices.perception.dll | 6.2.10240.16384 | Windows Devices Perception API
|
| | windows.devices.picker.dll | 6.2.10240.16384 | Device Picker
|
| | windows.devices.pointofservice.dll | 6.2.10240.16384 | Windows Runtime PointOfService DLL
|
| | windows.devices.portable.dll | 6.2.10240.16384 | Windows Runtime Portable Devices DLL
|
| | windows.devices.printers.dll | 6.2.10240.16384 | Windows Runtime Devices Printers DLL
|
| | windows.devices.printers.extensions.dll | 6.2.10240.16384 | Windows.Devices.Printers.Extensions
|
| | windows.devices.radios.dll | 6.2.10240.16384 | Windows.Devices.Radios DLL
|
| | windows.devices.scanners.dll | 6.2.10240.16384 | Windows Runtime Devices Scanners DLL
|
| | windows.devices.sensors.dll | 6.2.10240.16392 | Windows Runtime Sensors DLL
|
| | windows.devices.serialcommunication.dll | 6.2.10240.16384 | Windows.Devices.SerialCommunication DLL
|
| | windows.devices.smartcards.dll | 6.2.10240.16384 | Windows Runtime Smart Card API DLL
|
| | windows.devices.usb.dll | 6.2.10240.16384 | Windows Runtime Usb DLL
|
| | windows.devices.wifi.dll | 6.2.10240.16384 | Windows.Devices.WiFi DLL
|
| | windows.devices.wifidirect.dll | 6.2.10240.16384 | Windows.Devices.WiFiDirect DLL
|
| | windows.energy.dll | 6.2.10240.16384 | Windows Energy Runtime DLL
|
| | windows.gaming.input.dll | 6.2.10240.16384 | Windows Gaming Input API
|
| | windows.gaming.preview.dll | 6.2.10240.16384 | Windows Gaming API Preview
|
| | windows.gaming.xboxlive.storage.dll | 6.2.10240.16384 | Xbox Connected Storage WinRT implementation
|
| | windows.globalization.dll | 6.2.10240.16384 | Windows Globalization
|
| | windows.globalization.fontgroups.dll | 6.2.10240.16384 | Fonts Mapping API
|
| | windows.graphics.dll | 6.2.10240.16384 | WinRT Windows Graphics DLL
|
| | windows.graphics.printing.3d.dll | 6.2.10240.16384 | Microsoft Windows Printing Support
|
| | windows.graphics.printing.dll | 6.2.10240.16384 | Microsoft Windows Printing Support
|
| | windows.internal.bluetooth.dll | 6.2.10240.16397 | Windows.Internal.Bluetooth DLL
|
| | windows.internal.management.dll | 6.2.10240.16384 | Windows Managent Service DLL
|
| | windows.management.lockdown.dll | 6.2.10240.16384 | Windows Runtime Lockdown Management DLL
|
| | windows.management.workplace.workplacesettings.dll | 6.2.10240.16384 | Windows Runtime WorkplaceSettings DLL
|
| | windows.media.audio.dll | 6.2.10240.16384 | Windows Runtime Window Media Audio server DLL
|
| | windows.media.backgroundmediaplayback.dll | 6.2.10240.16384 | Windows Media BackgroundMediaPlayback DLL
|
| | windows.media.devices.dll | 6.2.10240.16384 | Windows Runtime media device server DLL
|
| | windows.media.dll | 6.2.10240.16401 | Windows Media Runtime DLL
|
| | windows.media.editing.dll | 6.2.10240.16393 | Windows Media Editing DLL
|
| | windows.media.faceanalysis.dll | 6.2.10240.16384 | Microsoft (R) Face Detection DLL
|
| | windows.media.import.dll | 6.2.10240.16393 | Windows Photo Import API (WinRT/COM)
|
| | windows.media.mediacontrol.dll | 6.2.10240.16384 | Windows Runtime MediaControl server DLL
|
| | windows.media.ocr.dll | 6.2.10240.16384 | Windows OCR Runtime DLL
|
| | windows.media.playback.backgroundmediaplayer.dll | 6.2.10240.16384 | Windows Media Playback BackgroundMediaPlayer DLL
|
| | windows.media.playback.mediaplayer.dll | 6.2.10240.16384 | Windows Media Playback MediaPlayer DLL
|
| | windows.media.playback.proxystub.dll | 6.2.10240.16384 | BackgroundMediaPlayer Proxy Stub DLL
|
| | windows.media.protection.playready.dll | 3.0.2777.0 | Microsoft PlayReady Client Framework Dll
|
| | windows.media.speech.dll | 6.2.10240.16425 | Windows Speech Runtime DLL
|
| | windows.media.speech.uxres.dll | 6.2.10240.16384 | Windows Media Speech UX Resources DLL
|
| | windows.media.streaming.dll | 12.0.10240.16384 | DLNA DLL
|
| | windows.media.streaming.ps.dll | 12.0.10240.16384 | DLNA Proxy-Stub DLL
|
| | windows.networking.backgroundtransfer.backgroundmanagerpolicy.dll | 6.2.10240.16384 | Background Transfer Background Manager Policy DLL
|
| | windows.networking.backgroundtransfer.dll | 6.2.10240.16384 | Windows.Networking.BackgroundTransfer DLL
|
| | windows.networking.connectivity.dll | 6.2.10240.16401 | Windows Networking Connectivity Runtime DLL
|
| | windows.networking.dll | 6.2.10240.16384 | Windows.Networking DLL
|
| | windows.networking.hostname.dll | 6.2.10240.16384 | Windows.Networking.HostName DLL
|
| | windows.networking.networkoperators.hotspotauthentication.dll | 6.2.10240.16384 | Microsoft Windows Hotspot Authentication API
|
| | windows.networking.proximity.dll | 6.2.10240.16384 | Windows Runtime Proximity API DLL
|
| | windows.networking.servicediscovery.dnssd.dll | 6.2.10240.16384 | Windows.Networking.ServiceDiscovery.Dnssd DLL
|
| | windows.networking.sockets.pushenabledapplication.dll | 6.2.10240.16384 | Windows.Networking.Sockets.PushEnabledApplication DLL
|
| | windows.networking.xboxlive.proxystub.dll | 6.2.10240.16384 | Windows.Networking.XboxLive Proxy Stub Dll
|
| | windows.security.authentication.onlineid.dll | 6.2.10240.16384 | Windows Runtime OnlineId Authentication DLL
|
| | windows.security.authentication.web.core.dll | 6.2.10240.16384 | Token Broker WinRT API
|
| | windows.security.credentials.ui.credentialpicker.dll | 6.2.10240.16384 | WinRT Credential Picker Server
|
| | windows.security.credentials.ui.userconsentverifier.dll | 6.2.10240.16384 | Windows User Consent Verifier API
|
| | windows.shell.search.urihandler.dll | 6.2.10240.16384 | Windows Search URI Handler
|
| | windows.shell.servicehostbuilder.dll | 6.2.10240.16384 | Windows.Shell.ServiceHostBuilder
|
| | windows.speech.pal.dll | 6.2.10240.16384 | Speech Platform Adaptation Layer DLL
|
| | windows.staterepository.dll | 6.2.10240.16384 | Windows StateRepository API Server
|
| | windows.staterepositorybroker.dll | 6.2.10240.16384 | Windows StateRepository API Broker
|
| | windows.staterepositoryclient.dll | 6.2.10240.16384 | Windows StateRepository API Broker
|
| | windows.storage.applicationdata.dll | 6.2.10240.16384 | Windows Application Data API Server
|
| | windows.storage.compression.dll | 6.2.10240.16384 | WinRT Compression
|
| | windows.storage.dll | 6.2.10240.16405 | Microsoft WinRT Storage API
|
| | windows.storage.search.dll | 6.2.10240.16384 | Windows.Storage.Search
|
| | windows.system.diagnostics.dll | 6.2.10240.16384 | Windows System Diagnostics DLL
|
| | windows.system.launcher.dll | 6.2.10240.16384 | Windows.System.Launcher
|
| | windows.system.profile.hardwareid.dll | 6.2.10240.16384 | Windows System Profile HardwareId DLL
|
| | windows.system.profile.retailinfo.dll | 6.2.10240.16384 | Windows.System.Profile.RetailInfo Runtime DLL
|
| | windows.system.profile.systemmanufacturers.dll | 6.2.10240.16384 | Windows.System.Profile.SystemManufacturers
|
| | windows.system.remotedesktop.dll | 6.2.10240.16384 | Windows System RemoteDesktop Runtime DLL
|
| | windows.system.systemmanagement.dll | 6.2.10240.16384 | Windows Runtime SystemManagement DLL
|
| | windows.ui.biofeedback.dll | 6.2.10240.16386 | Bio Feedback User Experience
|
| | windows.ui.blockedshutdown.dll | 6.2.10240.16386 | Blocked Shutdown User Experience
|
| | windows.ui.core.textinput.dll | 6.2.10240.16431 | Windows.UI.Core.TextInput dll
|
| | windows.ui.cred.dll | 6.2.10240.16391 | Credential Prompt User Experience
|
| | windows.ui.dll | 6.2.10240.16384 | Windows Runtime UI Foundation DLL
|
| | windows.ui.immersive.dll | 6.2.10240.16485 | WINDOWS.UI.IMMERSIVE
|
| | windows.ui.input.inking.dll | 6.2.10240.16384 | WinRT Windows Inking DLL
|
| | windows.ui.logon.dll | 6.2.10240.16431 | Logon User Experience
|
| | windows.ui.search.dll | 6.2.10240.16386 | Windows.UI.Search
|
| | windows.ui.xaml.dll | 6.2.10240.16431 | Windows.UI.Xaml dll
|
| | windows.ui.xaml.maps.dll | 6.2.10240.16384 | Windows UI XAML Maps API
|
| | windows.ui.xaml.phone.dll | 6.2.10240.16384 | Windows UI XAML Phone API
|
| | windows.ui.xaml.resources.dll | 6.2.10240.16384 | Windows.UI.Xaml.Resources dll
|
| | windows.web.diagnostics.dll | 6.2.10240.16384 | Windows.Web.Diagnostics
|
| | windows.web.dll | 6.2.10240.16384 | Web Client DLL
|
| | windows.web.http.dll | 6.2.10240.16384 | Windows.Web.Http DLL
|
| | windowsaccessbridge-32.dll | 8.0.51.16 | Java(TM) Platform SE binary
|
| | windowscodecs.dll | 6.2.10240.16384 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 6.2.10240.16384 | Microsoft Windows Codecs Extended Library
|
| | windowscodecsraw.dll | 6.2.10240.16384 | Microsoft Camera Codec Pack
|
| | windowslivelogin.dll | 6.2.10240.16384 | Microsoft® Account Login Helper
|
| | winfax.dll | 6.2.10240.16384 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 6.2.10240.16391 | Windows HTTP Services
|
| | wininet.dll | 11.0.10240.16391 | Internet Extensions for Win32
|
| | wininitext.dll | 6.2.10240.16384 | WinInit Utility Extension DLL
|
| | winipcfile.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services File API
|
| | winipcsecproc.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Desktop Security Processor
|
| | winipcsecproc_ssp.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Server Security Processor
|
| | winipsec.dll | 6.2.10240.16384 | Windows IPsec SPD Client DLL
|
| | winlangdb.dll | 6.2.10240.16384 | Windows Bcp47 Language Database
|
| | winmde.dll | 12.0.10240.16412 | WinMDE DLL
|
| | winmm.dll | 6.2.10240.16384 | MCI API DLL
|
| | winmmbase.dll | 6.2.10240.16384 | Base Multimedia Extension API DLL
|
| | winmsipc.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Client
|
| | winmsoirmprotector.dll | 6.2.10240.16384 | Windows Office file format IRM Protector
|
| | winnlsres.dll | 6.2.10240.16384 | NLSBuild resource DLL
|
| | winnsi.dll | 6.2.10240.16384 | Network Store Information RPC interface
|
| | winopcirmprotector.dll | 6.2.10240.16384 | Windows Office file format IRM Protector
|
| | winrnr.dll | 6.2.10240.16384 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 6.2.10240.16384 | remtsvc
|
| | winrsmgr.dll | 6.2.10240.16384 | WSMan Shell API
|
| | winrssrv.dll | 6.2.10240.16384 | winrssrv
|
| | winrttracing.dll | 6.2.10240.16384 | Windows Diagnostics Tracing
|
| | winsatapi.dll | 6.2.10240.16384 | Windows System Assessment Tool API
|
| | winscard.dll | 6.2.10240.16384 | Microsoft Smart Card API
|
| | winshfhc.dll | 6.2.10240.16384 | File Risk Estimation
|
| | winsku.dll | 6.2.10240.16384 | Windows SKU Library
|
| | winsockhc.dll | 6.2.10240.16384 | Winsock Network Diagnostic Helper Class
|
| | winsqlite3.dll | 3.8.8.3 | SQLite is a software library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine.
|
| | winsrpc.dll | 6.2.10240.16384 | WINS RPC LIBRARY
|
| | winsta.dll | 6.2.10240.16384 | Winstation Library
|
| | winsync.dll | 2007.94.10240.16384 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.10240.16384 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.10240.16384 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 6.2.10240.16385 | Microsoft Trust Verification APIs
|
| | wintypes.dll | 6.2.10240.16384 | Windows Base Types DLL
|
| | winusb.dll | 6.2.10240.16384 | Windows USB Driver User Library
|
| | wisp.dll | 6.2.10240.16384 | Microsoft Pen and Touch Input Component
|
| | wkscli.dll | 6.2.10240.16384 | Workstation Service Client DLL
|
| | wkspbrokerax.dll | 6.2.10240.16384 | Microsoft Workspace Broker ActiveX Control
|
| | wksprtps.dll | 6.2.10240.16384 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 6.2.10240.16384 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 6.2.10240.16384 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 6.2.10240.16384 | Dot11 Connection Flows
|
| | wlandlg.dll | 6.2.10240.16384 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 6.2.10240.16384 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlanmm.dll | 6.2.10240.16384 | Dot11 Media and AdHoc Managers
|
| | wlanmsm.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 6.2.10240.16384 | Wireless Preferred Networks
|
| | wlansec.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 6.2.10240.16384 | Wireless Profile UI
|
| | wlanutil.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 6.2.10240.16384 | Win32 LDAP API DLL
|
| | wldp.dll | 6.2.10240.16384 | Windows Lockdown Policy
|
| | wlgpclnt.dll | 6.2.10240.16384 | 802.11 Group Policy Client
|
| | wlidcli.dll | 6.2.10240.16384 | Microsoft® Account Dynamic Link Library
|
| | wlidcredprov.dll | 6.2.10240.16384 | Microsoft® Account Credential Provider
|
| | wlidfdp.dll | 6.2.10240.16384 | Microsoft® Account Function Discovery Provider
|
| | wlidnsp.dll | 6.2.10240.16384 | Microsoft® Account Namespace Provider
|
| | wlidprov.dll | 6.2.10240.16384 | Microsoft® Account Provider
|
| | wlidres.dll | 6.2.10240.16384 | Microsoft® Windows Live ID Resource
|
| | wls0wndh.dll | 6.2.10240.16384 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 6.2.10240.16384 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 6.2.10240.16384 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.10240.16384 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 6.2.10240.16384 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.10240.16384 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.10240.16384 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.10240.16384 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.10240.16384 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.10240.16384 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.10240.16384 | Windows Media Error Definitions (English)
|
| | wmi.dll | 6.2.10240.16384 | WMI DC and DP functionality
|
| | wmiclnt.dll | 6.2.10240.16384 | WMI Client API
|
| | wmidcom.dll | 6.2.10240.16384 | WMI
|
| | wmidx.dll | 12.0.10240.16384 | Windows Media Indexer DLL
|
| | wmiprop.dll | 6.2.10240.16384 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmitomi.dll | 6.2.10240.16384 | CIM Provider Adapter
|
| | wmnetmgr.dll | 12.0.10240.16384 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.10240.16397 | Windows Media Player
|
| | wmpdui.dll | 12.0.10240.16384 | Windows Media Player UI Engine
|
| | wmpdxm.dll | 12.0.10240.16384 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.10240.16384 | Windows Media Player Effects
|
| | wmphoto.dll | 6.2.10240.16384 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.10240.16384 | Windows Media Player Resources
|
| | wmpps.dll | 12.0.10240.16384 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.10240.16384 | Windows Media Player Launcher
|
| | wmsgapi.dll | 6.2.10240.16384 | WinLogon IPC Client
|
| | wmspdmod.dll | 6.2.10240.16384 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 6.2.10240.16384 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.10240.16384 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 6.2.10240.16384 | Windows Media Video Decoder
|
| | wmvdspa.dll | 6.2.10240.16384 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 6.2.10240.16384 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 6.2.10240.16384 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 6.2.10240.16384 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 6.2.10240.16384 | Windows Media Video Encoder
|
| | wofutil.dll | 6.2.10240.16384 | Windows Overlay File System Filter user mode API
|
| | wordbreakers.dll | |
|
| | workfoldersres.dll | 6.2.9200.16384 | Work Folders Resources
|
| | wow32.dll | 6.2.10240.16384 | Wow32
|
| | wpbcreds.dll | 6.2.10240.16384 | WP 8.1 upgrade support utility
|
| | wpc.dll | 6.2.10240.16384 | WPC Settings Library
|
| | wpdshext.dll | 6.2.10240.16384 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 6.2.10240.16384 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 6.2.10240.16384 | WMDM Service Provider for Windows Portable Devices
|
| | wpkbdlayout.dll | |
|
| | wpnapps.dll | 6.2.10240.16412 | Windows Push Notification Apps
|
| | wpportinglibrary.dll | 6.2.10240.16384 | <d> DLL
|
| | ws2_32.dll | 6.2.10240.16384 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 6.2.10240.16384 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 6.2.10240.16384 | Windows Security Center API
|
| | wscinterop.dll | 6.2.10240.16384 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 6.2.10240.16384 | Windows Security Center ISV API
|
| | wsclient.dll | 6.2.10240.16384 | Windows Store Licensing Client
|
| | wscproxystub.dll | 6.2.10240.16384 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 6.2.10240.16384 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 6.2.10240.16384 | WSD Challenge Component
|
| | wsecedit.dll | 6.2.10240.16384 | Security Configuration UI Module
|
| | wshbth.dll | 6.2.10240.16384 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.812.10240.16384 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 6.2.10240.16384 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.812.10240.16384 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 6.2.10240.16384 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 6.2.10240.16384 | Windows Sockets Helper DLL
|
| | wshqos.dll | 6.2.10240.16384 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 6.2.10240.16384 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 6.2.10240.16384 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmagent.dll | 6.2.10240.16384 | WinRM Agent
|
| | wsmanmigrationplugin.dll | 6.2.10240.16384 | WinRM Migration Plugin
|
| | wsmauto.dll | 6.2.10240.16384 | WSMAN Automation
|
| | wsmplpxy.dll | 6.2.10240.16384 | wsmplpxy
|
| | wsmres.dll | 6.2.10240.16384 | WSMan Resource DLL
|
| | wsmsvc.dll | 6.2.10240.16384 | WSMan Service
|
| | wsmwmipl.dll | 6.2.10240.16384 | WSMAN WMI Provider
|
| | wsnmp32.dll | 6.2.10240.16384 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 6.2.10240.16384 | Windows Socket 32-Bit DLL
|
| | wsp_fs.dll | 6.2.10240.16384 | Windows Storage Provider for FileShare management
|
| | wsp_health.dll | 6.2.10240.16384 | Windows Storage Provider for Health Agent API
|
| | wsp_sr.dll | 6.2.10240.16384 | Windows Storage Provider for Storage Replication management
|
| | wsshared.dll | 6.2.10240.16384 | WSShared DLL
|
| | wssync.dll | 6.2.10240.16384 | Windows Store Licensing Sync Client
|
| | wtsapi32.dll | 6.2.10240.16384 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 6.2.10240.16397 | Windows Update Client API
|
| | wudriver.dll | 6.2.10240.16384 | Windows Update WUDriver Stub
|
| | wups.dll | 6.2.10240.16384 | Windows Update client proxy stub
|
| | wvc.dll | 6.2.10240.16384 | Windows Visual Components
|
| | wwaapi.dll | 6.2.10240.16384 | Microsoft Web Application Host API library
|
| | wwaext.dll | 6.2.10240.16384 | Microsoft Web Application Host Extension library
|
| | wwanapi.dll | 6.2.10240.16384 | Mbnapi
|
| | wwapi.dll | 8.1.10240.16384 | WWAN API
|
| | xamldiagnostics.dll | 6.2.10240.16384 | Xaml Diagnostics
|
| | xaudio2_8.dll | 6.2.10240.16384 | XAudio2 Game Audio API
|
| | xaudio2_9.dll | 6.2.10240.16384 | XAudio2 Game Audio API
|
| | xblauthmanagerproxy.dll | 6.2.10240.16384 | XblAuthManagerProxy
|
| | xblauthtokenbrokerext.dll | 6.2.10240.16384 | Xbox Live Token Broker Extension
|
| | xblgamesaveproxy.dll | 6.2.10240.16384 | Xbox Connected Storage Service Proxies and Stubs
|
| | xinput1_4.dll | 6.2.10240.16384 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 6.2.10240.16384 | XNA Common Controller
|
| | xinputuap.dll | 6.2.10240.16384 | Microsoft Common Controller API
|
| | xmlfilter.dll | 2008.0.10240.16384 | XML Filter
|
| | xmllite.dll | 6.2.10240.16384 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 6.2.10240.16384 | Network Provisioning Service Client API
|
| | xolehlp.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsdocumenttargetprint.dll | 6.2.10240.16384 | XPS DocumentTargetPrint DLL
|
| | xpsfilt.dll | 6.2.10240.16384 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 6.2.10240.16384 | XPS to GDI Converter
|
| | xpsprint.dll | 6.2.10240.16384 | XPS Printing DLL
|
| | xpsrasterservice.dll | 6.2.10240.16384 | XPS Rasterization Service Component
|
| | xpsservices.dll | 6.2.10240.16384 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 6.2.10240.16384 | OPC Shell Metadata Handler
|
| | xwizards.dll | 6.2.10240.16384 | Extensible Wizards Manager Module
|
| | xwreg.dll | 6.2.10240.16384 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 6.2.10240.16384 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 6.2.10240.16384 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 6.2.10240.16384 | Compressed (zipped) Folders
|
| | ztrace_ca.dll | 6.2.10240.16384 | Ztrace_ca DLL
|
| | ztrace_maps.dll | 6.2.10240.16384 | ZTrace Event Resources
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Error | 5973 | 2015-09-21 16:10:06 | Truong | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 100 | 2015-09-22 18:48:08 | | Application Error | 1000: Faulting application name: SystemSettingsBroker.exe, version: 10.0.10240.16384, time stamp: 0x559f39c2 Faulting module name: NetworkMobileSettings.dll, version: 10.0.10240.16461, time stamp: 0x55d2dad2 Exception code: 0xc0000005 Fault offset: 0x00000000000b7ac0 Faulting process id: 0x1580 Faulting application start time: 0x01d0f52c8cfc6273 Faulting application path: C:\Windows\System32\SystemSettingsBroker.exe Faulting module path: C:\Windows\System32\NetworkMobileSettings.dll Report Id: 2a605275-84a2-409b-944e-dba949853de6 Faulting package full name: Faulting package-relative application ID:
|
| | Security | Audit Failure | 12290 | 2015-09-20 15:15:22 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:22 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x17436e2 Linked Logon ID: 0x1743710 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1743710 Linked Logon ID: 0x17436e2 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x17438d2 Linked Logon ID: 0x17438fe Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x17438fe Linked Logon ID: 0x17438d2 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x17438fe Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x17438d2 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x17436e2 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x17438d2 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x944 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-20 15:15:26 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-20 15:15:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 15:15:27 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:29 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:29 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:29 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 15:15:29 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 15:16:27 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1db8 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-09-20 15:18:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-20 15:18:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-20 15:56:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-20 15:56:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 15:56:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 15:56:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-20 16:19:40 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x101c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 16:19:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b166 Linked Logon ID: 0x1a2b17d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x101c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 16:19:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b17d Linked Logon ID: 0x1a2b166 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x101c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-20 16:19:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b166 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-20 16:19:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b17d Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12544 | 2015-09-20 16:19:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-20 16:19:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-20 16:19:42 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1743710 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-20 16:19:43 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x17328f0 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-20 16:19:43 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x17328c8 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c3aa Linked Logon ID: 0x1a3c3e3 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c3e3 Linked Logon ID: 0x1a3c3aa Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c5ed Linked Logon ID: 0x1a3c619 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c619 Linked Logon ID: 0x1a3c5ed Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c619 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c5ed Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c3aa Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3c5ed Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1d7c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-20 21:29:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-09-20 21:29:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-20 21:29:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-20 21:29:33 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 21:29:33 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 21:29:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-20 21:30:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0xd28 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-20 21:51:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-20 21:51:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 21:51:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-20 21:51:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-20 22:32:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 22:32:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-20 22:39:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x11dc Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-20 22:51:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-20 22:51:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-20 22:59:28 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-20 22:59:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10db Linked Logon ID: 0x1cf10f0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-20 22:59:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10f0 Linked Logon ID: 0x1cf10db Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-20 22:59:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10db Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-20 22:59:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10f0 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2015-09-20 22:59:29 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3c3e3 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-20 22:59:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b17d Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-20 22:59:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x1a2b166 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01a05 Linked Logon ID: 0x1d01a33 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01a33 Linked Logon ID: 0x1d01a05 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01c0c Linked Logon ID: 0x1d01c38 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01c38 Linked Logon ID: 0x1d01c0c Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01c38 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01c0c Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01a05 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1d01c0c Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x19fc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-21 13:57:15 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 13:57:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 13:57:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 13:57:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 13:58:17 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0xa60 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 14:57:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 14:57:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-21 15:02:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1c54 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:03:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 15:03:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:09:06 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:09:06 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 15:09:06 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 15:09:06 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:15:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 15:15:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:15:51 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 15:15:51 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-21 15:16:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-21 15:16:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-21 15:26:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-21 15:26:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-21 15:29:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-21 15:29:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:32:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-21 15:32:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 15:32:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 15:32:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-21 16:05:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-21 16:05:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 16:05:47 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 16:05:47 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-21 16:10:02 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x171c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 16:10:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be81b Linked Logon ID: 0x22be835 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x171c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 16:10:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be835 Linked Logon ID: 0x22be81b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x171c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-21 16:10:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be81b Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-21 16:10:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be835 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2015-09-21 16:10:08 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1d01a33 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-21 16:10:09 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10f0 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-21 16:10:09 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1cf10db Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1674 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1bc3 Linked Logon ID: 0x22d1bf5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1bf5 Linked Logon ID: 0x22d1bc3 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1ddf Linked Logon ID: 0x22d1e21 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1e21 Linked Logon ID: 0x22d1ddf Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1e21 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1ddf Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1bc3 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x22d1ddf Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-21 21:28:32 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 21:28:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-21 21:29:32 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0xbd4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 21:58:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-21 21:58:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 21:58:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-21 21:58:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-21 22:16:36 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 22:16:36 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-21 22:17:04 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x21e4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13824 | 2015-09-21 22:20:27 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x17c0 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13824 | 2015-09-21 22:25:38 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1eb4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-21 22:44:34 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-21 22:44:34 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1758 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e66 Linked Logon ID: 0x25c6e85 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1758 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e85 Linked Logon ID: 0x25c6e66 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1758 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e66 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e85 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-21 22:54:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-21 22:54:38 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x22d1bf5 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-21 22:54:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be835 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-21 22:54:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x22be81b Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4b0d Linked Logon ID: 0x25d4b46 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4b46 Linked Logon ID: 0x25d4b0d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4cf1 Linked Logon ID: 0x25d4d1d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4d1d Linked Logon ID: 0x25d4cf1 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4d1d Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4cf1 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4b0d Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x25d4cf1 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1fc4 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-22 18:46:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-22 18:46:49 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-22 18:46:49 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:49 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 18:46:49 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:51 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:51 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:51 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-22 18:46:51 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 12544 | 2015-09-22 18:49:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 18:49:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-22 18:50:34 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0xbcc Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-09-22 18:52:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 18:52:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-22 18:57:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 18:57:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:02:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:02:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 19:02:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 19:02:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-22 19:19:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 19:19:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12288 | 2015-09-22 19:19:54 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x128 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-09-22T12:19:59.691987600Z New Time: 2015-09-22T12:19:54.353695400Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-09-22 19:19:54 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x128 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-09-22T12:19:54.354319800Z New Time: 2015-09-22T12:19:54.353000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-09-22 19:19:54 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x128 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-09-22T12:19:54.353921000Z New Time: 2015-09-22T12:19:54.353000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12544 | 2015-09-22 19:20:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 19:20:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 19:20:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x548 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:20:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:20:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 19:20:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 19:20:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:47:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-22 19:47:48 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 19:47:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 19:47:48 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-22 20:18:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-22 20:18:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 20:18:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-22 20:18:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-22 21:37:34 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-22 21:37:34 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-22 21:43:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 21:43:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-22 21:44:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13824 | 2015-09-22 21:45:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x134c Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-09-22 22:54:15 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-22 22:54:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x3063088 Linked Logon ID: 0x30630ad Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-22 22:54:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x30630ad Linked Logon ID: 0x3063088 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-22 22:54:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x3063088 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-22 22:54:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x30630ad Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2015-09-22 22:54:16 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x25d4b46 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-22 22:54:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e85 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-22 22:54:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x25c6e66 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:50 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x23bc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072a09 Linked Logon ID: 0x3072a39 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072a39 Linked Logon ID: 0x3072a09 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072c0b Linked Logon ID: 0x3072c37 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072c37 Linked Logon ID: 0x3072c0b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x32c Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072c37 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072c0b Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072a09 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x3072c0b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-23 19:09:51 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:53 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:53 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:53 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-23 19:09:53 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 12544 | 2015-09-23 19:12:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-23 19:12:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-23 19:13:41 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x72c Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:25:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:25:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:25:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:25:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:32:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:32:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:32:02 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:32:02 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-23 19:41:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-23 19:41:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:48:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:48:26 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:48:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:48:26 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:59:10 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-23 19:59:10 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-23 19:59:10 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-23 19:59:10 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-23 20:19:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x324 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-23 20:19:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-09-23 20:19:38 | | Microsoft-Windows-Eventlog | 1100:
|
| | Security | Audit Success | 12545 | 2015-09-23 20:19:38 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x3072a39 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:51 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x198 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:51 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1a4 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x198 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2015-09-24 11:52:51 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:54 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x230 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x198 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x230 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x294 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x198 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x29c New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x230 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2a4 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2e8 New Process Name: ????????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x328 New Process Name: ????????????????-??6??c?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x29c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-09-24 11:52:56 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x330 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x29c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-09-24 11:52:57 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x93ad
|
| | Security | Audit Success | 12292 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1059f Linked Logon ID: 0x105c0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x105c0 Linked Logon ID: 0x1059f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1059f Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x105c0 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:52:58 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x22734 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1d0 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x590 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:52:59 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x590 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2ad68 Linked Logon ID: 0x2ad9f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2ad9f Linked Logon ID: 0x2ad68 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2b5c8 Linked Logon ID: 0x2b5fd Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2b5fd Linked Logon ID: 0x2b5c8 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2b5fd Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2b5c8 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2ad68 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x2b5c8 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-24 11:53:00 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:53:02 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:53:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1158 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-09-24 11:53:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1158 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:06 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2ad9f Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:06 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2ad9f Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:06 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2ad9f Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 11:53:06 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2ad9f Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Failure | 12290 | 2015-09-24 11:53:34 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 11:53:34 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-24 11:56:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 11:56:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x182c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1913f9 Linked Logon ID: 0x191430 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x182c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x191430 Linked Logon ID: 0x1913f9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x182c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1913f9 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x191430 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 12:02:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-24 12:02:44 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x2ad9f This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-24 12:02:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x105c0 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-24 12:02:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1059f Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3944 Linked Logon ID: 0x1a3972 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3972 Linked Logon ID: 0x1a3944 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3944 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1cb0 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:04 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3b28 Linked Logon ID: 0x1a3b54 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3b54 Linked Logon ID: 0x1a3b28 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3b54 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3b28 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1a3b28 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-24 18:43:05 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-24 18:43:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 18:43:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 18:43:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-24 18:45:11 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1d54 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-24 18:49:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 18:49:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:17:02 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:17:02 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:17:02 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 19:17:02 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:27:53 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:27:53 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:27:53 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 19:27:53 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:33:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:33:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:33:01 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:33:01 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:42:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:42:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:42:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 19:42:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:51:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 19:51:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 19:51:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 19:51:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 20:00:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-24 20:01:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 20:01:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-24 21:47:22 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 21:47:22 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 21:47:22 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 21:47:22 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 21:59:08 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-24 21:59:08 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 21:59:08 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-24 21:59:08 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 22:27:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 22:27:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-24 22:27:06 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-24 22:27:06 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0xe7c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcd6 Linked Logon ID: 0xa9fcff Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xe7c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcff Linked Logon ID: 0xa9fcd6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xe7c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcd6 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcff Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-24 22:48:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-24 22:48:46 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1a3972 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-24 22:48:47 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x191430 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-24 22:48:47 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1913f9 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab0629 Linked Logon ID: 0xab0658 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab0658 Linked Logon ID: 0xab0629 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab0629 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x610 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:21 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab080f Linked Logon ID: 0xab083b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab083b Linked Logon ID: 0xab080f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab083b Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab080f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xab080f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-25 10:13:22 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-25 10:13:23 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 10:13:23 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:26 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:26 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:26 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 10:13:26 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 10:14:35 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0xe94 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-25 10:17:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 10:17:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1e6c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9c9e6 Linked Logon ID: 0xc9ca19 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1e6c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9ca19 Linked Logon ID: 0xc9c9e6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1e6c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9c9e6 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9ca19 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 11:13:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-25 11:13:17 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xab0658 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-25 11:13:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcff Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 11:13:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0xa9fcd6 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcaddbe Linked Logon ID: 0xcaddec Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcaddec Linked Logon ID: 0xcaddbe Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcadfb9 Linked Logon ID: 0xcadfe5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcadfe5 Linked Logon ID: 0xcadfb9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcadfe5 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcadfb9 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcaddbe Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0xcadfb9 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x133c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:50 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-25 14:45:51 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-25 14:45:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 14:45:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 14:45:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 14:47:00 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1748 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-09-25 14:48:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 14:48:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-25 14:50:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 14:50:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 14:50:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 14:50:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 15:12:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 15:12:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-25 15:14:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 15:14:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 15:14:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 15:14:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-09-25 15:24:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1df0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2015-09-25 16:08:30 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x308 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 16:08:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015aae Linked Logon ID: 0x1015ad4 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x308 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 16:08:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015ad4 Linked Logon ID: 0x1015aae Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x308 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 16:08:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015aae Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 16:08:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015ad4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2015-09-25 16:08:31 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0xcaddec This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-25 16:08:33 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9ca19 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 16:08:33 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0xc9c9e6 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Failure | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x10258cb Linked Logon ID: 0x10258fb Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x10258fb Linked Logon ID: 0x10258cb Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1025af6 Linked Logon ID: 0x1025b33 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1025b33 Linked Logon ID: 0x1025af6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1025b33 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1025af6 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x10258cb Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1025af6 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x11f8 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:11 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Failure | 12290 | 2015-09-25 21:52:12 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 21:52:12 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13826 | 2015-09-25 21:52:12 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:14 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:14 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:14 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 21:52:14 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-25 21:53:10 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x604 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:02:07 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:02:07 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 22:02:07 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 22:02:07 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:08:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:08:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 22:08:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 22:08:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:38:37 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:38:37 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 22:38:37 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 22:38:37 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 22:39:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 22:39:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:54:10 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-09-25 22:54:10 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-25 22:54:10 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-25 22:54:10 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1d18 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368641 Linked Logon ID: 0x1368668 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1d18 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368668 Linked Logon ID: 0x1368641 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1d18 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368641 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368668 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-09-25 22:57:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-09-25 22:57:51 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x10258fb This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-25 22:57:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015ad4 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-25 22:57:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1015aae Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1378ff8 Linked Logon ID: 0x1379031 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1379031 Linked Logon ID: 0x1378ff8 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1378ff8 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1ca8 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:21 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1379238 Linked Logon ID: 0x1379264 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1379264 Linked Logon ID: 0x1379238 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379264 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379238 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1379238 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-09-26 08:48:22 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-09-26 08:48:23 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:23 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:24 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379031 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:24 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379031 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:24 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379031 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 08:48:24 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379031 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Failure | 12290 | 2015-09-26 08:48:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-26 08:48:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-26 08:48:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x328 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-26 08:48:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-09-26 08:52:32 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1b58 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:52:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x144a000 Linked Logon ID: 0x144a035 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1b58 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 08:52:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x144a035 Linked Logon ID: 0x144a000 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1b58 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-09-26 08:52:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x144a000 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-26 08:52:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x144a035 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2015-09-26 08:52:34 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1379031 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2015-09-26 08:52:36 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368668 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-26 08:52:36 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x1368641 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {772D356F-D139-4408-97E5-CBE1D1ADBE22} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\a63f85bf532403431e59bf70d8a145bd_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {8A74782A-334C-4672-B492-90C16ECC23D8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\0632cfaa5f0e97e033cc4c7b134eac93_ee759b59-7166-4417-b468-2bb994b319d6 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1459d6a Linked Logon ID: 0x1459d98 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1459d98 Linked Logon ID: 0x1459d6a Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: VANBANGIT Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x145a936 Linked Logon ID: 0x145a962 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x145a962 Linked Logon ID: 0x145a936 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x330 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: VANBANGIT Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x145a962 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x145a936 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x1459d6a Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: truongvanbang@hotmail.com Account Domain: MicrosoftAccount Logon ID: 0x145a936 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x5d8 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:54 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Changed Attributes: SAM Account Name: - Display Name: Truong Van Bang User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Failure | 12290 | 2015-09-26 17:58:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12292 | 2015-09-26 17:58:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\6d00fa390c15cc4634c8ca8153b76f29_911499c7-ef29-47ed-a64c-6b1751f20848 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13826 | 2015-09-26 17:58:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: VANBANGIT$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d98 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Administrator Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d98 Additional Information: Caller Workstation: VANBANGIT Target Account Name: DefaultAccount Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d98 Additional Information: Caller Workstation: VANBANGIT Target Account Name: Guest Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 17:58:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d98 Additional Information: Caller Workstation: VANBANGIT Target Account Name: HomeGroupUser$ Target Account Domain: vanbangit
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-500 Account Name: Administrator Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-501 Account Name: Guest Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-1003 Account Name: HomeGroupUser$ Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a User: Security ID: S-1-5-21-886380259-2908458254-2842452784-503 Account Name: DefaultAccount Account Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-579 Group Name: Access Control Assistance Operators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-21-886380259-2908458254-2842452784-1002 Group Name: HomeUsers Group Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-578 Group Name: Hyper-V Administrators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-09-26 18:01:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-886380259-2908458254-2842452784-1001 Account Name: Truong Account Domain: VANBANGIT Logon ID: 0x1459d6a Group: Security ID: S-1-5-21-886380259-2908458254-2842452784-1000 Group Name: WinRMRemoteWMIUsers__ Group Domain: vanbangit Process Information: Process ID: 0x1bcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme Edition\aida64.exe
|
| | System | Error | None | 2015-09-20 16:19:40 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 16:19:40 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 16:19:40 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 16:19:40 | | Service Control Manager | 7031:
|
| | System | Warning | 1014 | 2015-09-20 21:29:39 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-09-20 22:59:28 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 22:59:28 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 22:59:28 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-20 22:59:28 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 13:59:22 | Truong | DCOM |
|
| | System | Warning | 1014 | 2015-09-21 14:53:39 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name clients4.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-21 15:08:18 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name clients1.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-21 15:30:50 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name s.youtube.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-21 15:44:38 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.amazon.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-21 15:45:20 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.WORKGROUP timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-21 15:45:29 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name clients4.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-09-21 16:06:42 | | Tcpip | 4230: TCP/IP has chosen to restrict the congestion window for several connections due to a network condition. This could be related to a problem in the TCP global or supplemental configuration and will cause degraded throughput.
|
| | System | Error | None | 2015-09-21 16:10:02 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 16:10:02 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 16:10:02 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 16:10:02 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 16:10:06 | Truong | DCOM |
|
| | System | Error | None | 2015-09-21 22:54:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 22:54:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 22:54:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-21 22:54:37 | | Service Control Manager | 7031:
|
| | System | Warning | 1014 | 2015-09-22 18:47:45 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.WORKGROUP timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-22 18:48:43 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.WORKGROUP timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-22 21:46:45 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.facebook.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-22 21:48:33 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-09-22 22:54:15 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-22 22:54:15 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-22 22:54:15 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-22 22:54:15 | | Service Control Manager | 7031:
|
| | System | Warning | 1014 | 2015-09-23 19:10:10 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.WORKGROUP timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-23 19:10:41 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name login.live.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-23 19:11:00 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.WORKGROUP timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-09-23 20:19:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-23 20:19:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-23 20:19:37 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-23 20:19:37 | | Service Control Manager | 7031:
|
| | System | Warning | None | 2015-09-24 11:52:56 | | BTHUSB | 28:
|
| | System | Error | None | 2015-09-24 11:54:05 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:07 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:13 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:13 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:14 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:17 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:22 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:23 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:25 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:26 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:28 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:31 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:31 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:37 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:38 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:39 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:40 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:41 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:44 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:51 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:52 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:58 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:59 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 11:54:59 | LOCAL SERVICE | DCOM |
|
| | System | Error | None | 2015-09-24 12:02:43 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 12:02:43 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 12:02:43 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 12:02:43 | | Service Control Manager | 7031:
|
| | System | Warning | 1014 | 2015-09-24 21:45:37 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name s.youtube.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-09-24 22:24:55 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name s.youtube.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-09-24 22:48:45 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 22:48:45 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 22:48:45 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-24 22:48:45 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 10:15:29 | Truong | DCOM |
|
| | System | Warning | 1014 | 2015-09-25 11:12:13 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name thanmadigioi.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-09-25 11:13:16 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 11:13:16 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 11:13:16 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 11:13:16 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 16:08:30 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 16:08:30 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 16:08:30 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 16:08:30 | | Service Control Manager | 7031:
|
| | System | Error | 1 | 2015-09-25 22:38:42 | SYSTEM | Microsoft-Windows-WindowsUpdateClient | 20:
|
| | System | Error | None | 2015-09-25 22:57:50 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 22:57:50 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 22:57:50 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-25 22:57:50 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-26 08:48:49 | Truong | DCOM |
|
| | System | Error | None | 2015-09-26 08:52:32 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-26 08:52:32 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-26 08:52:32 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-26 08:52:32 | | Service Control Manager | 7031:
|
| | System | Error | None | 2015-09-26 18:00:04 | | Application Popup | 875:
|
| | System | Error | None | 2015-09-26 18:00:04 | | Service Control Manager | 7000:
|
| | System | Error | None | 2015-09-26 18:00:04 | | Application Popup | 875:
|
| | System | Error | None | 2015-09-26 18:00:04 | | Service Control Manager | 7000:
|