| | | |
|
| | DLL File | Version | Description
|
| | abovelockapphost.dll | 10.0.10041.0 | AboveLockAppHost
|
| | accessibilitycpl.dll | 10.0.10041.0 | Pa-nen die?u khie?n de? truy nha?p
|
| | accountscontrolinternal.dll | 10.0.10041.0 | Accounts Control Broker Objects
|
| | acctres.dll | 10.0.10041.0 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 10.0.10041.0 | Access Control List Editor
|
| | aclui.dll | 10.0.10041.0 | Security Descriptor Editor
|
| | acppage.dll | 10.0.10041.0 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 10.0.10041.0 | Ba?o ma?t va? Ba?o tri?
|
| | actioncentercpl.dll | 10.0.10041.0 | Pa-nen Die?u khie?n B?o m?t va B?o tri
|
| | activeds.dll | 10.0.10041.0 | ADs Router Layer DLL
|
| | actxprxy.dll | 10.0.10041.0 | ActiveX Interface Marshaling Library
|
| | admtmpl.dll | 10.0.10041.0 | Administrative Templates Extension
|
| | adprovider.dll | 10.0.10041.0 | adprovider DLL
|
| | adrclient.dll | 10.0.10041.0 | Microsoft® Access Denied Remediation Client
|
| | adsldp.dll | 10.0.10041.0 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 10.0.10041.0 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 10.0.10041.0 | ADs LDAP Provider DLL
|
| | adsnt.dll | 10.0.10041.0 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 10.0.10041.0 | Security Audit Schema DLL
|
| | advapi32.dll | 10.0.10041.0 | Advanced Windows 32 Base API
|
| | advapi32res.dll | 10.0.10041.0 | Advanced Windows 32 Base API
|
| | advpack.dll | 11.0.10041.0 | ADVPACK
|
| | aeevts.dll | 10.0.10041.0 | Application Experience Event Resources
|
| | amsi.dll | 4.8.10041.0 | Anti-Malware Scan Interface
|
| | amstream.dll | 10.0.10041.0 | DirectShow Runtime.
|
| | apds.dll | 10.0.10041.0 | Mo-dun Di?ch vu? Du? lie?u Tro? giup Microsoft®
|
| | appcapture.dll | 10.0.10041.0 | Windows Runtime AppCapture DLL
|
| | appcontracts.dll | 10.0.10041.0 | Windows AppContracts API Server
|
| | appidapi.dll | 10.0.10041.0 | Application Identity APIs Dll
|
| | appidpolicyengineapi.dll | 10.0.10041.0 | AppId Policy Engine API Module
|
| | applockercsp.dll | 10.0.10041.0 | AppLockerCSP
|
| | appmgmts.dll | 10.0.10041.0 | Software installation Service
|
| | appmgr.dll | 10.0.10041.0 | Software Installation Snapin Extenstion
|
| | apprepapi.dll | 10.0.10041.0 | Application Reputation APIs Dll
|
| | apprepsync.dll | 10.0.10041.0 | AppRepSync Task
|
| | appxalluserstore.dll | 10.0.10041.0 | AppX All User Store DLL
|
| | appxapplicabilityengine.dll | 10.0.10041.0 | AppX Applicability Engine
|
| | appxdeploymentclient.dll | 10.0.10041.0 | AppX Deployment Client DLL
|
| | appxpackaging.dll | 10.0.10041.0 | Native Code Appx Packaging Library
|
| | appxsip.dll | 10.0.10041.0 | Appx Subject Interface Package
|
| | apphelp.dll | 10.0.10041.0 | Application Compatibility Client Library
|
| | apphlpdm.dll | 10.0.10041.0 | Application Compatibility Help Module
|
| | asferror.dll | 12.0.10041.0 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.6.42.0 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 10.0.10041.0 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.325 | ATL Module for Windows
|
| | atlthunk.dll | 10.0.10041.0 | atlthunk.dll
|
| | atmfd.dll | 5.1.2.241 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.241 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 10.0.10041.0 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 10.0.10041.0 | Audio Engine
|
| | audiokse.dll | 10.0.10041.0 | Audio Ks Endpoint
|
| | audioses.dll | 10.0.10041.0 | Audio Session
|
| | auditnativesnapin.dll | 10.0.10041.0 | Audit Policy Group Policy Editor Extension
|
| | auditpolicygpinterop.dll | 10.0.10041.0 | Audit Policy GP Module
|
| | auditpolmsg.dll | 10.0.10041.0 | Audit Policy MMC SnapIn Messages
|
| | autoplay.dll | 10.0.10041.0 | Pa-nen Die?u khie?n Phat Tu? do?ng
|
| | authbroker.dll | 10.0.10041.0 | Xa?c thu?c Web WinRT API
|
| | authbrokerui.dll | 10.0.10041.0 | AuthBroker UI
|
| | authext.dll | 10.0.10041.0 | Authentication Extensions
|
| | authfwcfg.dll | 10.0.10041.0 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 10.0.10041.0 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 10.0.10041.0 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 10.0.10041.0 | Wizard Framework
|
| | authui.dll | 10.0.10041.0 | Giao die?n Xac thu?c cu?a Windows
|
| | authz.dll | 10.0.10041.0 | Authorization Framework
|
| | avicap32.dll | 10.0.10041.0 | AVI Capture window class
|
| | avifil32.dll | 10.0.10041.0 | Microsoft AVI File support library
|
| | avrt.dll | 10.0.10041.0 | Multimedia Realtime Runtime
|
| | azroles.dll | 10.0.10041.0 | azroles Module
|
| | azroleui.dll | 10.0.10041.0 | Authorization Manager
|
| | azsqlext.dll | 10.0.10041.0 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | azuresettingsyncprovider.dll | 10.0.10041.0 | Azure Setting Sync Provider
|
| | backgroundmediapolicy.dll | 10.0.10041.0 | <d> Background Media Policy DLL
|
| | basecsp.dll | 10.0.10041.0 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 10.0.10041.0 | DLL Bo? tro? giup Do?ng ho? Do Pin
|
| | bcastdvr.proxy.dll | 10.0.10041.0 | Broadcast DVR Proxy
|
| | bcd.dll | 10.0.10041.0 | BCD DLL
|
| | bcp47langs.dll | 10.0.10041.0 | BCP47 Language Classes
|
| | bcrypt.dll | 10.0.10041.0 | Windows Cryptographic Primitives Library
|
| | bcryptprimitives.dll | 10.0.10041.0 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 10.0.10041.0 | Bidispl DLL
|
| | bingmaps.dll | 10.0.10041.0 | Bing Map Control
|
| | biocredprov.dll | 10.0.10041.2 | WinBio Credential Provider
|
| | bitsperf.dll | 7.8.10041.0 | Perfmon Counter Access
|
| | bitsproxy.dll | 7.8.10041.0 | Background Intelligent Transfer Service Proxy
|
| | biwinrt.dll | 10.0.10041.0 | Windows Background Broker Infrastructure
|
| | blackbox.dll | 11.0.10041.0 | BlackBox DLL
|
| | bluetoothapis.dll | 10.0.10041.0 | Bluetooth Usermode Api host
|
| | bootvid.dll | 10.0.10041.0 | VGA Boot Driver
|
| | browcli.dll | 10.0.10041.0 | Browser Service Client DLL
|
| | browsersettingsync.dll | 10.0.10041.0 | Browser Setting Synchronization
|
| | browseui.dll | 10.0.10041.0 | Shell Browser UI Library
|
| | btpanui.dll | 10.0.10041.0 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | U?ng du?ng ngu? ca?nhH
|
| | c_g18030.dll | 10.0.10041.0 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_gsm7.dll | 10.0.10041.0 | GSM 7bit Code Page Translation DLL for SMS
|
| | c_is2022.dll | 10.0.10041.0 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 10.0.10041.0 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 10.0.10041.0 | Microsoft® Cabinet File API
|
| | cabview.dll | 10.0.10041.0 | Tri?nh xem Te?p Cabinet cu?a Mo? ro?ng Vo?
|
| | callbuttons.dll | 10.0.10041.0 | Windows Runtime CallButtonsServer DLL
|
| | callbuttons.proxystub.dll | 10.0.10041.0 | Windows Runtime CallButtonsServer ProxyStub DLL
|
| | capiprovider.dll | 10.0.10041.0 | capiprovider DLL
|
| | capisp.dll | 10.0.10041.0 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.10941.0 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.10941.0 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.10941.0 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 10.0.10041.0 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.10041.0 | Microsoft CDO for Windows Library
|
| | certca.dll | 10.0.10041.0 | Microsoft® Active Directory Certificate Services CA
|
| | certcli.dll | 10.0.10041.0 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 10.0.10041.0 | Cert Credential Provider
|
| | certenc.dll | 10.0.10041.0 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 10.0.10041.0 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 10.0.10041.0 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 10.0.10041.0 | Certificates snap-in
|
| | certpoleng.dll | 10.0.10041.0 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.10041.0 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 10.0.10041.0 | Configuration Backend Interface
|
| | cfgmgr32.dll | 10.0.10041.0 | Configuration Manager DLL
|
| | cfmifs.dll | 10.0.10041.0 | FmIfs Engine
|
| | cfmifsproxy.dll | 10.0.10041.0 | Microsoft® FmIfs Proxy Library
|
| | cic.dll | 10.0.10041.0 | CIC - MMC controls for Taskpad
|
| | clb.dll | 10.0.10041.0 | Column List Box
|
| | clbcatq.dll | 2001.12.10941.0 | COM+ Configuration Catalog
|
| | cleanpol.dll | 10.0.10041.0 | CleanPol.dll
|
| | clfsw32.dll | 10.0.10041.0 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 10.0.10041.0 | SQL Client Configuration Utility DLL
|
| | clipboardserver.dll | 10.0.10041.0 | Modern Clipboard API Server
|
| | clipc.dll | 10.0.10041.0 | Client Licensing Platform Client
|
| | cloudbackupsettings.dll | 10.0.10041.0 | Nha? cung ca?p Thie?t da?t Sao luu Da?m may
|
| | clrhost.dll | 10.0.10041.0 | In Proc server for managed servers in the Windows Runtime
|
| | clusapi.dll | 10.0.10041.0 | Cluster API Library
|
| | cmcfg32.dll | 7.2.10041.0 | Microsoft Connection Manager Configuration Dll
|
| | cmdext.dll | 10.0.10041.0 | cmd.exe Extension DLL
|
| | cmdial32.dll | 7.2.10041.0 | Microsoft Connection Manager
|
| | cmifw.dll | 10.0.10041.0 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 10.0.10041.0 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.10041.0 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.10041.0 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.10041.0 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.10041.0 | Microsoft Connection Manager Utility Lib
|
| | cnvfat.dll | 10.0.10041.0 | FAT File System Conversion Utility DLL
|
| | cngcredui.dll | 10.0.10041.0 | Nha? cung ca?p Microsoft CNG CredUI
|
| | cngprovider.dll | 10.0.10041.0 | cngprovider DLL
|
| | colbact.dll | 2001.12.10941.0 | COM+
|
| | colorcnv.dll | 10.0.10041.0 | Windows Media Color Conversion
|
| | colorui.dll | 10.0.10041.0 | Microsoft Color Control Panel
|
| | combase.dll | 10.0.10041.0 | Microsoft COM for Windows
|
| | comcat.dll | 10.0.10041.0 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.10041.0 | Thu vie?n Die?u khie?n Tra?i nghie?m Nguo?i du?ng
|
| | comdlg32.dll | 10.0.10041.0 | Common Dialogs DLL
|
| | coml2.dll | 10.0.10041.0 | Microsoft COM for Windows
|
| | commstypehelperutil_ca.dll | 10.0.10041.0 | Comms Type Helper Util
|
| | compobj.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | comppkgsup.dll | 12.0.10041.0 | Component Package Support DLL
|
| | compstui.dll | 10.0.10041.0 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.10941.0 | COM+
|
| | comres.dll | 2001.12.10941.0 | COM+ Resources
|
| | comsnap.dll | 2001.12.10941.0 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.10941.0 | COM+ Services
|
| | comuid.dll | 2001.12.10941.0 | COM+ Explorer UI
|
| | configureexpandedstorage.dll | 10.0.10041.0 | ConfigureExpandedStorage
|
| | connect.dll | 10.0.10041.0 | Get Connected Wizards
|
| | connectedaccountstate.dll | 10.0.10041.0 | ConnectedAccountState.dll
|
| | console.dll | 10.0.10041.0 | Control Panel Console Applet
|
| | coremessaging.dll | 10.0.10011.0 | Microsoft CoreMessaging Dll
|
| | coremmres.dll | 10.0.10041.0 | General Core Multimedia Resources
|
| | coreuicomponents.dll | |
|
| | cortanamapihelper.dll | 10.0.10041.0 | CortanaMapiHelper
|
| | cortanamapihelper.proxystub.dll | 10.0.10041.0 | CortanaMapiHelper.ProxyStub
|
| | cpfilters.dll | 10.0.10041.0 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credentialmigrationhandler.dll | 10.0.10041.0 | Credential Migration Handler
|
| | credprovdatamodel.dll | 10.0.10041.4 | Cred Prov Data Model
|
| | credprovhost.dll | 10.0.10041.0 | May ch? luu tr? Khung cong vi?c Nha cung c?p Thong tin dang nh?p
|
| | credprovs.dll | 10.0.10041.0 | Nha cung c?p Thong tin dang nh?p
|
| | credssp.dll | 10.0.10041.0 | Credential Delegation Security Package
|
| | credui.dll | 10.0.10041.0 | Credential Manager User Interface
|
| | crossdeviceappmodelprotocol.dll | 10.0.10041.0 | Windows CrossDevice Appmodel Protocol
|
| | crossdeviceappmodelserver.dll | 10.0.10041.0 | Windows CrossDevice Appmodel Server
|
| | crossdeviceappmodelwinrt.dll | 10.0.10041.0 | Windows CrossDevice Appmodel WinRT
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 10.0.10041.0 | Crypto API32
|
| | cryptbase.dll | 10.0.10041.0 | Base cryptographic API DLL
|
| | cryptdlg.dll | 10.0.10041.0 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 10.0.10041.0 | Cryptography Manager
|
| | cryptext.dll | 10.0.10041.0 | Crypto Shell Extensions
|
| | cryptnet.dll | 10.0.10041.0 | Crypto Network Related API
|
| | cryptngc.dll | 10.0.10041.0 | Windows NGC key API
|
| | cryptowinrt.dll | 10.0.10041.0 | Crypto WinRT Library
|
| | cryptsp.dll | 10.0.10041.0 | Cryptographic Service Provider API
|
| | crypttpmeksvc.dll | 10.0.10041.0 | Cryptographic TPM Endorsement Key Services
|
| | cryptui.dll | 10.0.10041.0 | Microsoft Trust UI Provider
|
| | cryptuiwizard.dll | 10.0.10041.0 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 10.0.10041.0 | XML DigSig API
|
| | cscapi.dll | 10.0.10041.0 | Offline Files Win32 API
|
| | cscdll.dll | 10.0.10041.0 | Offline Files Temporary Shim
|
| | cscobj.dll | 10.0.10041.0 | In-proc COM object used by clients of CSC API
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | chakra.dll | 11.0.10041.0 | Microsoft ® JScript
|
| | chakradiag.dll | 11.0.10041.0 | Microsoft ® JScript Diagnostics
|
| | chartv.dll | 10.0.10041.0 | Chart View
|
| | chxreadingstringime.dll | 10.0.10041.0 | CHxReadingStringIME
|
| | d2d1.dll | 10.0.10041.0 | Microsoft D2D Library
|
| | d3d10.dll | 10.0.10041.0 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 10.0.10041.0 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 10.0.10041.0 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 10.0.10041.0 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 10.0.10041.0 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 10.0.10041.0 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 10.0.10041.0 | Direct3D 11 Runtime
|
| | d3d12.dll | 10.0.10041.0 | Direct3D 12 Runtime
|
| | d3d8.dll | 10.0.10041.0 | Microsoft Direct3D
|
| | d3d8thk.dll | 10.0.10041.0 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 10.0.10041.0 | Direct3D 9 Runtime
|
| | d3dcompiler_47.dll | 10.0.10041.0 | Direct3D HLSL Compiler
|
| | d3dim.dll | 10.0.10041.0 | Microsoft Direct3D
|
| | d3dim700.dll | 10.0.10041.0 | Microsoft Direct3D
|
| | d3dramp.dll | 10.0.10041.0 | Microsoft Direct3D
|
| | d3dxof.dll | 10.0.10041.0 | DirectX Files DLL
|
| | dabapi.dll | 10.0.10041.0 | Desktop Activity Broker API
|
| | dafprintprovider.dll | 10.0.10041.0 | DAF Print Provider DLL
|
| | daotpcredentialprovider.dll | 10.0.10041.0 | DirectAccess One-Time Password Credential Provider
|
| | dataclen.dll | 10.0.10041.0 | Tri?nh do?n Khong gian Di?a cho Windows
|
| | dataexchange.dll | 10.0.10041.0 | Data exchange
|
| | davclnt.dll | 10.0.10041.0 | Web DAV Client DLL
|
| | davhlpr.dll | 10.0.10041.0 | DAV Helper DLL
|
| | dbgcore.dll | 10.0.10041.0 | Windows Core Debugging Helpers
|
| | dbgeng.dll | 10.0.10041.0 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 10.0.10041.0 | Windows Image Helper
|
| | dbgmodel.dll | 10.0.10041.0 | Windows Debugger Data Model
|
| | dbnetlib.dll | 10.0.10041.0 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 10.0.10041.0 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 10.0.10041.0 | DCI Manager
|
| | dcomp.dll | 10.0.10041.0 | Microsoft DirectComposition Library
|
| | ddaclsys.dll | 10.0.10041.0 | SysPrep module for Resetting Data Drive ACL
|
| | ddoiproxy.dll | 10.0.10041.0 | DDOI Interface Proxy
|
| | ddores.dll | 10.0.10041.0 | Thong tin danh mu?c thie?t bi? va? ta?i nguyen
|
| | ddraw.dll | 10.0.10041.0 | Microsoft DirectDraw
|
| | ddrawex.dll | 10.0.10041.0 | Direct Draw Ex
|
| | defaultdevicemanager.dll | 10.0.10041.0 | Default Device Manager
|
| | defaultprinterprovider.dll | 10.0.10041.0 | Nha? cung ca?p Ma?y in Ma?c di?nh cu?a Microsoft Windows
|
| | delegatorprovider.dll | 10.0.10041.0 | WMI PassThru Provider for Storage Management
|
| | deskadp.dll | 10.0.10041.0 | Advanced display adapter properties
|
| | deskmon.dll | 10.0.10041.0 | Advanced display monitor properties
|
| | devdispitemprovider.dll | 10.0.10041.0 | DeviceItem inproc devquery subsystem
|
| | devenum.dll | 10.0.10041.0 | Device enumeration.
|
| | deviceaccess.dll | 10.0.10041.0 | Device Broker And Policy COM Server
|
| | deviceassociation.dll | 10.0.10041.0 | Device Association Client DLL
|
| | devicecenter.dll | 10.0.10041.0 | Trung tam Thie?t bi?
|
| | devicedisplaystatusmanager.dll | 10.0.10041.0 | Tri?nh Qua?n ly? Tra?ng tha?i Hie?n thi? Thie?t bi?
|
| | devicepairing.dll | 10.0.10041.0 | Pha?n mo? ro?ng vo? cho Ca?p doi Thie?t bi?
|
| | devicepairingfolder.dll | 10.0.10041.0 | Device Pairing Folder
|
| | devicepairingproxy.dll | 10.0.10041.0 | Device Pairing Proxy Dll
|
| | devicesetupstatusprovider.dll | 10.0.10041.0 | Dll Bo? cung ca?p Tra?ng tha?i Thie?t la?p Thie?t bi?
|
| | deviceuxres.dll | 10.0.10041.0 | Windows Device User Experience Resource File
|
| | devmgr.dll | 10.0.10041.0 | Device Manager MMC Snapin
|
| | devobj.dll | 10.0.10041.0 | Device Information Set DLL
|
| | devrtl.dll | 10.0.10041.0 | Device Management Run Time Library
|
| | dfscli.dll | 10.0.10041.0 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 10.0.10041.0 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 10.0.10041.0 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 10.0.10041.0 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 10.0.10041.0 | DHCP Client Service
|
| | dhcpcore6.dll | 10.0.10041.0 | DHCPv6 Client
|
| | dhcpcsvc.dll | 10.0.10041.0 | DHCP Client Service
|
| | dhcpcsvc6.dll | 10.0.10041.0 | DHCPv6 Client
|
| | dhcpsapi.dll | 10.0.10041.0 | DHCP Server API Stub DLL
|
| | dialclient.dll | 12.0.10041.0 | DIAL DLL
|
| | dictationmanager.dll | 10.0.0.1 | Dictation Manager
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 10.0.10041.0 | DIMS Job DLL
|
| | dimsroam.dll | 10.0.10041.0 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 10.0.10041.0 | Microsoft DirectInput
|
| | dinput8.dll | 10.0.10041.0 | Microsoft DirectInput
|
| | directdb.dll | 10.0.10041.0 | Microsoft Direct Database API
|
| | directmanipulation.dll | 10.0.10041.0 | Microsoft Direct Manipulation Component
|
| | dismapi.dll | 10.0.10041.0 | DISM API Framework
|
| | dispex.dll | 5.12.10041.0 | Microsoft ® DispEx
|
| | display.dll | 10.0.10041.0 | Pa-nen Die?u khie?n Hie?n thi?
|
| | displaymanager.dll | 10.0.10041.0 | DisplayManager
|
| | dlnashext.dll | 12.0.10041.0 | DLNA Namespace DLL
|
| | dmband.dll | 10.0.10041.0 | Microsoft DirectMusic Band
|
| | dmcompos.dll | 10.0.10041.0 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 10.0.10041.0 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 10.0.10041.0 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 10.0.10041.0 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 10.0.10041.0 | Disk Management Snap-in Resources
|
| | dmime.dll | 10.0.10041.0 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 10.0.10041.0 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 10.0.10041.0 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 10.0.10041.0 | TreeView OCX
|
| | dmscript.dll | 10.0.10041.0 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 10.0.10041.0 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 10.0.10041.0 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 10.0.10041.0 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 10.0.10041.0 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 10.0.10041.0 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 10.0.10041.0 | DNS Client API DLL
|
| | dnscmmc.dll | 10.0.10041.0 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 10.0.10041.0 | Trang Thuo?c tinh OLE DocFile
|
| | dolbydecmft.dll | 10.0.10041.0 | Media Foundation Dolby Digital Decoders
|
| | dot3api.dll | 10.0.10041.0 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 10.0.10041.0 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 10.0.10041.0 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 10.0.10041.0 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 10.0.10041.0 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 10.0.10041.0 | Dot3 Helper Class
|
| | dot3msm.dll | 10.0.10041.0 | 802.3 Media Specific Module
|
| | dot3ui.dll | 10.0.10041.0 | 802.3 Advanced UI
|
| | dpapi.dll | 10.0.10041.0 | Data Protection API
|
| | dpapiprovider.dll | 10.0.10041.0 | dpapiprovider DLL
|
| | dplayx.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpmodemx.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnaddr.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnathlp.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnet.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnlobby.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnhpast.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpnhupnp.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpwsockx.dll | 10.0.10041.0 | DirectPlay Stub
|
| | dpx.dll | 10.0.10041.0 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.10041.0 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.10041.0 | DRMv2 Client DLL
|
| | drprov.dll | 10.0.10041.0 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 10.0.10041.0 | Distributed Routing Table
|
| | drtprov.dll | 10.0.10041.0 | Distributed Routing Table Providers
|
| | drttransport.dll | 10.0.10041.0 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 10.0.10041.0 | Driver Store API
|
| | dsauth.dll | 10.0.10041.0 | DS Authorization for Services
|
| | dsccoreconfprov.dll | 6.2.9200.16384 | DSC
|
| | dsclient.dll | 10.0.10041.0 | Data Sharing Service Client DLL
|
| | dsdmo.dll | 10.0.10041.0 | DirectSound Effects
|
| | dskquota.dll | 10.0.10041.0 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 10.0.10041.0 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 10.0.10041.0 | DirectSound
|
| | dsparse.dll | 10.0.10041.0 | Active Directory Domain Services API
|
| | dsprop.dll | 10.0.10041.0 | Windows Active Directory Property Pages
|
| | dsquery.dll | 10.0.10041.0 | Directory Service Find
|
| | dsrole.dll | 10.0.10041.0 | DS Setup Client DLL
|
| | dssec.dll | 10.0.10041.0 | Directory Service Security UI
|
| | dssenh.dll | 10.0.10041.0 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsui.dll | 10.0.10041.0 | Device Setup UI Pages
|
| | dsuiext.dll | 10.0.10041.0 | Directory Service Common UI
|
| | dswave.dll | 10.0.10041.0 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 10.0.10041.0 | Detection and Sharing Status API
|
| | dui70.dll | 10.0.10041.0 | Windows DirectUI Engine
|
| | duser.dll | 10.0.10041.0 | Windows DirectUser Engine
|
| | dwmapi.dll | 10.0.10041.0 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 10.0.10041.2 | Microsoft DWM Core Library
|
| | dwrite.dll | 10.0.10041.0 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 10.0.10041.0 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 10.0.10041.0 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.10041.0 | Microsoft Windows Media Component Removal File.
|
| | dxptasksync.dll | 10.0.10041.0 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 11.0.10041.0 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 11.0.10041.0 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 10.0.10041.0 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 10.0.10041.0 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 10.0.10041.0 | Eap Peer Config
|
| | eappgnui.dll | 10.0.10041.0 | EAP Generic UI
|
| | eappprxy.dll | 10.0.10041.0 | Microsoft EAPHost Peer Client DLL
|
| | eapprovp.dll | 10.0.10041.0 | EAP extension DLL
|
| | eapphost.dll | 10.0.10041.0 | Microsoft EAPHost Peer service
|
| | easwrt.dll | 10.0.10041.0 | Exchange ActiveSync Windows Runtime DLL
|
| | edgehtml.dll | 11.0.10041.0 | Microsoft (R) HTML Viewer
|
| | editbuffertesthook.dll | |
|
| | edpauditapi.dll | 10.0.10041.0 | EDP Audit API
|
| | edputil.dll | 10.0.10041.0 | EDP util
|
| | efsadu.dll | 10.0.10041.0 | File Encryption Utility
|
| | efscore.dll | 10.0.10041.0 | EFS Core Library
|
| | efsext.dll | |
|
| | efsutil.dll | 10.0.10041.0 | EFS Utility Library
|
| | efswrt.dll | 10.0.10041.0 | Storage Protection Windows Runtime DLL
|
| | ehstorapi.dll | 10.0.10041.0 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 10.0.10041.0 | Microsoft Enhanced Storage Password Manager
|
| | els.dll | 10.0.10041.0 | Event Viewer Snapin
|
| | elscore.dll | 10.0.10041.0 | Els Core Platform DLL
|
| | elshyph.dll | 10.0.10041.0 | ELS Hyphenation Service
|
| | elslad.dll | 10.0.10041.0 | ELS Language Detection
|
| | elstrans.dll | 10.0.10041.0 | ELS Transliteration Service
|
| | encapi.dll | 10.0.10041.0 | Encoder API
|
| | encdec.dll | 10.0.10041.0 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 10.0.10041.0 | EQoS Snapin extension
|
| | es.dll | 2001.12.10941.0 | COM+
|
| | esdsip.dll | 10.0.10041.0 | Crypto SIP provider for signing and verifying .esd Electronic Software Distribution files
|
| | esent.dll | 10.0.10041.0 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 10.0.10041.0 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | esevss.dll | 10.0.10041.0 | Microsoft(R) ESENT shadow utilities
|
| | etweseproviderresources.dll | 10.0.10041.0 | Microsoft ESE ETW
|
| | eventcls.dll | 10.0.10041.0 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 10.0.10041.0 | Enhanced Video Renderer DLL
|
| | execmodelclient.dll | 10.0.10041.0 | ExecModelClient
|
| | execmodelproxy.dll | 10.0.10041.0 | ExecModelProxy
|
| | explorerframe.dll | 10.0.10041.0 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | f3ahvoas.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | familysafetyext.dll | 10.0.10041.0 | FamilySafety ChildAccount Extensions
|
| | faultrep.dll | 10.0.10041.0 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 10.0.10041.0 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 10.0.10041.0 | Bluetooth Provider Proxy Dll
|
| | fddevquery.dll | 10.0.10041.0 | Microsoft Windows Device Query Helper
|
| | fde.dll | 10.0.10041.0 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 10.0.10041.0 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 10.0.10041.0 | Pnp Provider Dll
|
| | fdprint.dll | 10.0.10041.0 | Dll Bo? cung ca?p In Kha?m pha? Chu?c nang
|
| | fdproxy.dll | 10.0.10041.0 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 10.0.10041.0 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 10.0.10041.0 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 10.0.10041.0 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 10.0.10041.0 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 10.0.10041.0 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 10.0.10041.0 | Services and Shared Folders
|
| | findnetprinters.dll | 10.0.10041.0 | Find Network Printers COM Component
|
| | firewallapi.dll | 10.0.10041.0 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 10.0.10041.0 | Windows Firewall Control Panel
|
| | fltlib.dll | 10.0.10041.0 | Filter Library
|
| | fmifs.dll | 10.0.10041.0 | FM IFS Utility DLL
|
| | fms.dll | 10.0.10041.0 | Di?ch vu? Qua?n ly? Phong
|
| | fontext.dll | 10.0.10041.0 | Ca?p Phong cu?a Windows
|
| | fontsub.dll | 10.0.10041.0 | Font Subsetting DLL
|
| | fphc.dll | 10.0.10041.0 | Filtering Platform Helper Class
|
| | framedyn.dll | 10.0.10041.0 | WMI SDK Provider Framework
|
| | framedynos.dll | 10.0.10041.0 | WMI SDK Provider Framework
|
| | frprov.dll | 10.0.10041.0 | Folder Redirection WMI Provider
|
| | fsutilext.dll | 10.0.10041.0 | FS Utility Extension DLL
|
| | fundisc.dll | 10.0.10041.0 | Function Discovery Dll
|
| | fwbase.dll | 10.0.10041.0 | Firewall Base DLL
|
| | fwcfg.dll | 10.0.10041.0 | Windows Firewall Configuration Helper
|
| | fwpolicyiomgr.dll | 10.0.10041.0 | FwPolicyIoMgr DLL
|
| | fwpuclnt.dll | 10.0.10041.0 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 10.0.10041.0 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 10.0.10041.0 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 10.0.10041.0 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 10.0.10041.0 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 10.0.10041.0 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 10.0.10041.0 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 10.0.10041.0 | Microsoft Fax Transport Provider
|
| | gameux.dll | 10.0.10041.0 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gcdef.dll | 10.0.10041.0 | Game Controllers Default Sheets
|
| | gdi32.dll | 10.0.10041.0 | GDI Client DLL
|
| | gdiplus.dll | 10.0.10041.0 | Microsoft GDI+
|
| | geocommon.dll | 10.0.10041.0 | Geocommon
|
| | geolocation.dll | 10.0.10041.0 | Geolocation Runtime DLL
|
| | geolocatorhelper.dll | 10.0.10041.0 | GeoLocatorHelper
|
| | getuname.dll | 10.0.10041.0 | Unicode name Dll for UCE
|
| | glmf32.dll | 10.0.10041.0 | OpenGL Metafiling DLL
|
| | globcollationhost.dll | 10.0.10041.0 | GlobCollationHost
|
| | globinputhost.dll | 10.0.10041.0 | Windows Globalization Extension API for Input
|
| | glu32.dll | 10.0.10041.0 | OpenGL Utility Library DLL
|
| | gpapi.dll | 10.0.10041.0 | Group Policy Client API
|
| | gpedit.dll | 10.0.10041.0 | GPEdit
|
| | gpprefcl.dll | 10.0.10041.0 | Group Policy Preference Client
|
| | gpprnext.dll | 10.0.10041.0 | Group Policy Printer Extension
|
| | gpscript.dll | 10.0.10041.0 | Script Client Side Extension
|
| | gptext.dll | 10.0.10041.0 | GPTExt
|
| | hbaapi.dll | 10.0.10041.0 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 10.0.10041.0 | Nha? cung ca?p Ba?o tri? va? Ba?o ma?t
|
| | helppaneproxy.dll | 10.0.10041.0 | Microsoft® Help Proxy
|
| | hevcdecoder.dll | 10.0.10041.0 | Windows H265 Video Decoder
|
| | hgcpl.dll | 10.0.10041.0 | HomeGroup Control Panel
|
| | hhsetup.dll | 10.0.10041.0 | Microsoft® HTML Help
|
| | hid.dll | 10.0.10041.0 | Hid User Library
|
| | hidserv.dll | 10.0.10041.0 | Human Interface Device Service
|
| | hlink.dll | 10.0.10041.0 | Ca?u pha?n cu?a Microsoft Office 2000
|
| | hmkd.dll | 10.0.10041.0 | Windows HMAC Key Derivation API
|
| | hnetcfg.dll | 10.0.10041.0 | Home Networking Configuration Manager
|
| | hnetmon.dll | 10.0.10041.0 | Home Networking Monitor DLL
|
| | httpapi.dll | 10.0.10041.0 | HTTP Protocol Stack API
|
| | htui.dll | 10.0.10041.0 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 10.0.10041.0 | Network Policy Server
|
| | iasacct.dll | 10.0.10041.0 | NPS Accounting Provider
|
| | iasads.dll | 10.0.10041.0 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 10.0.10041.0 | NPS Datastore server
|
| | iashlpr.dll | 10.0.10041.0 | NPS Surrogate Component
|
| | iasmigplugin.dll | 10.0.10041.0 | NPS Migration DLL
|
| | iasnap.dll | 10.0.10041.0 | NPS NAP Provider
|
| | iaspolcy.dll | 10.0.10041.0 | NPS Pipeline
|
| | iasrad.dll | 10.0.10041.0 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 10.0.10041.0 | NPS XML Datastore Access
|
| | iassam.dll | 10.0.10041.0 | NPS NT SAM Provider
|
| | iassdo.dll | 10.0.10041.0 | NPS SDO Component
|
| | iassvcs.dll | 10.0.10041.0 | NPS Services Component
|
| | iccvid.dll | 1.10.0.12 | Cinepak® Codec
|
| | icm32.dll | 10.0.10041.0 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 10.0.10041.0 | ICMP DLL
|
| | icmui.dll | 10.0.10041.0 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 10.0.10041.0 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 10.0.10041.0 | Internet Gateway Device properties
|
| | idctrls.dll | 10.0.10041.0 | Kie?m soa?t nha?n da?ng
|
| | idndl.dll | 10.0.10041.0 | Downlevel DLL
|
| | idstore.dll | 10.0.10041.0 | Identity Store
|
| | ieadvpack.dll | 11.0.10041.0 | ADVPACK
|
| | ieapfltr.dll | 11.0.10041.0 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.10041.0 | IEAK branding
|
| | ieetwproxystub.dll | 11.0.10041.0 | IE ETW Collector Proxy Stub Resources
|
| | ieframe.dll | 11.0.10041.0 | Tri?nh duye?t Internet
|
| | iepeers.dll | 11.0.10041.0 | Cac do?i tuo?ng ngang hang cu?a Internet Explorer
|
| | iernonce.dll | 11.0.10041.0 | Extended RunOnce processing with UI
|
| | iertutil.dll | 11.0.10041.0 | Tie?n i?ch tho?i gian cha?y cho Internet Explorer
|
| | iesetup.dll | 11.0.10041.0 | IOD Version Map
|
| | iesysprep.dll | 11.0.10041.0 | IE Sysprep Provider
|
| | ieui.dll | 11.0.10041.0 | Internet Explorer UI Engine
|
| | ifmon.dll | 10.0.10041.0 | IF Monitor DLL
|
| | ifsutil.dll | 10.0.10041.0 | IFS Utility DLL
|
| | ifsutilx.dll | 10.0.10041.0 | IFS Utility Extension DLL
|
| | ig4icd32.dll | 9.17.10.3347 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | igd10umd32.dll | 9.17.10.3347 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igdde32.dll | |
|
| | igdumd32.dll | 9.17.10.3347 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igfx11cmrt32.dll | 2.4.0.1020 | CM Runtime Dynamic Link Library (DX11)
|
| | igfxcmjit32.dll | 2.4.0.1020 | CM JIT Dynamic Link Library
|
| | igfxcmrt32.dll | 2.4.0.1020 | CM Runtime Dynamic Link Library
|
| | igfxdv32.dll | 8.15.10.3347 | igfxdev Module
|
| | igfxexps32.dll | 8.15.10.3347 | igfxext Module
|
| | iglhcp32.dll | 3.0.1.15 | iglhcp32 Dynamic Link Library
|
| | iglhsip32.dll | 3.0.0.12 | iglhsip32 Dynamic Link Library
|
| | imagehlp.dll | 10.0.10041.0 | Windows NT Image Helper
|
| | imageres.dll | 10.0.10041.0 | Windows Image Resource
|
| | imagesp1.dll | 10.0.10041.0 | Windows SP1 Image Resource
|
| | imapi.dll | 10.0.10041.0 | Image Mastering API
|
| | imapi2.dll | 10.0.10041.0 | Image Mastering API v2
|
| | imapi2fs.dll | 10.0.10041.0 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 11.0.10041.0 | IE plugin image decoder support DLL
|
| | imm32.dll | 10.0.10041.0 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 10.0.10041.0 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 10.0.10041.0 | Microsoft MIB-II subagent
|
| | inetres.dll | 10.0.10041.0 | Microsoft Internet Messaging API Resources
|
| | inkanalysis.dll | 10.0.10041.0 | InkAnalysis DLL
|
| | inked.dll | 10.0.10041.0 | Microsoft Tablet PC InkEdit Control
|
| | inkobjcore.dll | 10.0.10041.0 | Microsoft Tablet PC Ink Platform Component
|
| | input.dll | 10.0.10041.0 | InputSetting DLL
|
| | inputinjectionbroker.dll | 10.0.10041.0 | Broker for WinRT input injection.
|
| | inputlocalemanager.dll | |
|
| | inputservice.dll | |
|
| | inputswitch.dll | 10.0.10041.0 | Tri?nh Chuye?n Nha?p Microsoft Windows
|
| | inseng.dll | 11.0.10041.0 | Install engine
|
| | iologmsg.dll | 10.0.10041.0 | IO Logging DLL
|
| | iotassignedaccesslockframework.dll | 10.0.10041.0 | Windows Runtime Assigned Access Management DLL
|
| | ipeloggingdictationhelper.dll | 1.0.0.1 | IPE Logging Library Helper
|
| | iprop.dll | 10.0.10041.0 | OLE PropertySet Implementation
|
| | iprtprio.dll | 10.0.10041.0 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 10.0.10041.0 | IP Router Manager
|
| | ipsecsnp.dll | 10.0.10041.0 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 10.0.10041.0 | IP Security Monitor Snap-in
|
| | iphlpapi.dll | 10.0.10041.0 | IP Helper API
|
| | ir32_32.dll | 10.0.10041.0 | IR32_32 WRAPPER DLL
|
| | ir32_32original.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_32original.dll | 4.51.16.3 | Intel Indeo® Video 4.5
|
| | ir41_qc.dll | 10.0.10041.0 | IR41_QC WRAPPER DLL
|
| | ir41_qcoriginal.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 10.0.10041.0 | IR41_QCX WRAPPER DLL
|
| | ir41_qcxoriginal.dll | 4.30.64.1 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 10.0.10041.0 | IR50_32 WRAPPER DLL
|
| | ir50_32original.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 10.0.10041.0 | IR50_QC WRAPPER DLL
|
| | ir50_qcoriginal.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 10.0.10041.0 | IR50_QCX WRAPPER DLL
|
| | ir50_qcxoriginal.dll | 5.0.64.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 10.0.10041.0 | Infrared Class Coinstaller
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 10.0.10041.0 | iSCSI Discovery api
|
| | iscsied.dll | 10.0.10041.0 | iSCSI Extension DLL
|
| | iscsium.dll | 10.0.10041.0 | iSCSI Discovery api
|
| | iscsiwmi.dll | 10.0.10041.0 | MS iSCSI Initiator WMI Provider
|
| | iscsiwmiv2.dll | 10.0.10041.0 | WMI Provider for iSCSI
|
| | itircl.dll | 10.0.10041.0 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 10.0.10041.0 | Microsoft® InfoTech Storage System Library
|
| | iyuv_32.dll | 10.0.10041.0 | Intel Indeo(R) Video YUV Codec
|
| | javascriptcollectionagent.dll | 11.0.10041.0 | JavaScript Performance Collection Agent
|
| | joinproviderol.dll | 10.0.10041.0 | Online Join Provider DLL
|
| | joinutil.dll | 10.0.10041.0 | Join Utility DLL
|
| | jpmapcontrol.dll | 10.0.10041.0 | Jupiter Map Control
|
| | jscript.dll | 5.12.10041.0 | Microsoft ® JScript
|
| | jscript9.dll | 11.0.10041.0 | Microsoft ® JScript
|
| | jscript9diag.dll | 11.0.10041.0 | Microsoft ® JScript Diagnostics
|
| | jsproxy.dll | 11.0.10041.0 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 10.0.10041.0 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 10.0.10041.0 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 10.0.10041.0 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 10.0.10041.0 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 10.0.10041.0 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 10.0.10041.0 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 10.0.10041.0 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 10.0.10041.0 | Albania Keyboard Layout
|
| | kbdarme.dll | 10.0.10041.0 | Eastern Armenian Keyboard Layout
|
| | kbdarmph.dll | 10.0.10041.0 | Armenian Phonetic Keyboard Layout
|
| | kbdarmty.dll | 10.0.10041.0 | Armenian Typewriter Keyboard Layout
|
| | kbdarmw.dll | 10.0.10041.0 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 10.0.10041.0 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 10.0.10041.0 | Azeri-Latin Keyboard Layout
|
| | kbdazst.dll | 10.0.10041.0 | Azerbaijani (Standard) Keyboard Layout
|
| | kbdbash.dll | 10.0.10041.0 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 10.0.10041.0 | Belgian Keyboard Layout
|
| | kbdbene.dll | 10.0.10041.0 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 10.0.10041.0 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 10.0.10041.0 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 10.0.10041.0 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 10.0.10041.0 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 10.0.10041.0 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 10.0.10041.0 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbug.dll | 10.0.10041.0 | Buginese Keyboard Layout
|
| | kbdbulg.dll | 10.0.10041.0 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 10.0.10041.0 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 10.0.10041.0 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcr.dll | 10.0.10041.0 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 10.0.10041.0 | Czech Keyboard Layout
|
| | kbdcz1.dll | 10.0.10041.0 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 10.0.10041.0 | Czech_Programmer's Keyboard Layout
|
| | kbdcher.dll | 10.0.10041.0 | Cherokee Nation Keyboard Layout
|
| | kbdcherp.dll | 10.0.10041.0 | Cherokee Phonetic Keyboard Layout
|
| | kbdda.dll | 10.0.10041.0 | Danish Keyboard Layout
|
| | kbddiv1.dll | 10.0.10041.0 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 10.0.10041.0 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 10.0.10041.0 | Dvorak US English Keyboard Layout
|
| | kbddzo.dll | 10.0.10041.0 | Dzongkha Keyboard Layout
|
| | kbdes.dll | 10.0.10041.0 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 10.0.10041.0 | Estonia Keyboard Layout
|
| | kbdfa.dll | 10.0.10041.0 | Persian Keyboard Layout
|
| | kbdfar.dll | 10.0.10041.0 | Persian Standard Keyboard Layout
|
| | kbdfc.dll | 10.0.10041.0 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 10.0.10041.0 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 10.0.10041.0 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 10.0.10041.0 | F?roese Keyboard Layout
|
| | kbdfr.dll | 10.0.10041.0 | French Keyboard Layout
|
| | kbdfthrk.dll | 10.0.10041.0 | Futhark Keyboard Layout
|
| | kbdgae.dll | 10.0.10041.0 | Scottish Gaelic (United Kingdom) Keyboard Layout
|
| | kbdgeo.dll | 10.0.10041.0 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 10.0.10041.0 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeome.dll | 10.0.10041.0 | Georgian (MES) Keyboard Layout
|
| | kbdgeooa.dll | 10.0.10041.0 | Georgian (Old Alphabets) Keyboard Layout
|
| | kbdgeoqw.dll | 10.0.10041.0 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 10.0.10041.0 | Greek_Latin Keyboard Layout
|
| | kbdgn.dll | 10.0.10041.0 | Guarani Keyboard Layout
|
| | kbdgr.dll | 10.0.10041.0 | German Keyboard Layout
|
| | kbdgr1.dll | 10.0.10041.0 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 10.0.10041.0 | Greenlandic Keyboard Layout
|
| | kbdgthc.dll | 10.0.10041.0 | Gothic Keyboard Layout
|
| | kbdhau.dll | 10.0.10041.0 | Hausa Keyboard Layout
|
| | kbdhaw.dll | 10.0.10041.0 | Hawaiian Keyboard Layout
|
| | kbdhe.dll | 10.0.10041.0 | Greek Keyboard Layout
|
| | kbdhe220.dll | 10.0.10041.0 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 10.0.10041.0 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 10.0.10041.0 | KBDHEB Keyboard Layout
|
| | kbdhebl3.dll | 10.0.10041.0 | Hebrew Standard Keyboard Layout
|
| | kbdhela2.dll | 10.0.10041.0 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 10.0.10041.0 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 10.0.10041.0 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 10.0.10041.0 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 10.0.10041.0 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 10.0.10041.0 | Igbo Keyboard Layout
|
| | kbdic.dll | 10.0.10041.0 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 10.0.10041.0 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 10.0.10041.0 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 10.0.10041.0 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 10.0.10041.0 | Bengali Keyboard Layout
|
| | kbdindev.dll | 10.0.10041.0 | Devanagari Keyboard Layout
|
| | kbdinen.dll | 10.0.10041.0 | English (India) Keyboard Layout
|
| | kbdinkan.dll | 10.0.10041.0 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 10.0.10041.0 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 10.0.10041.0 | Marathi Keyboard Layout
|
| | kbdinori.dll | 10.0.10041.0 | Odia Keyboard Layout
|
| | kbdinpun.dll | 10.0.10041.0 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 10.0.10041.0 | Tamil Keyboard Layout
|
| | kbdintel.dll | 10.0.10041.0 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 10.0.10041.0 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdinguj.dll | 10.0.10041.0 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 10.0.10041.0 | Hindi Keyboard Layout
|
| | kbdir.dll | 10.0.10041.0 | Irish Keyboard Layout
|
| | kbdit.dll | 10.0.10041.0 | Italian Keyboard Layout
|
| | kbdit142.dll | 10.0.10041.0 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 10.0.10041.0 | Inuktitut Latin Keyboard Layout
|
| | kbdjav.dll | 10.0.10041.0 | Javanese Keyboard Layout
|
| | kbdjpn.dll | 10.0.10041.0 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 10.0.10041.0 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkni.dll | 10.0.10041.0 | Khmer (NIDA) Keyboard Layout
|
| | kbdkor.dll | 10.0.10041.0 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkurd.dll | 10.0.10041.0 | Central Kurdish Keyboard Layout
|
| | kbdkyr.dll | 10.0.10041.0 | Kyrgyz Keyboard Layout
|
| | kbdkhmr.dll | 10.0.10041.0 | Cambodian Standard Keyboard Layout
|
| | kbdla.dll | 10.0.10041.0 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 10.0.10041.0 | Lao Standard Keyboard Layout
|
| | kbdlisub.dll | 10.0.10041.0 | Lisu Basic Keyboard Layout
|
| | kbdlisus.dll | 10.0.10041.0 | Lisu Standard Keyboard Layout
|
| | kbdlk41a.dll | 10.0.10041.0 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 10.0.10041.0 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 10.0.10041.0 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 10.0.10041.0 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 10.0.10041.0 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 10.0.10041.0 | Latvia-QWERTY Keyboard Layout
|
| | kbdlvst.dll | 10.0.10041.0 | Latvian (Standard) Keyboard Layout
|
| | kbdmac.dll | 10.0.10041.0 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 10.0.10041.0 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 10.0.10041.0 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 10.0.10041.0 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 10.0.10041.0 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 10.0.10041.0 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 10.0.10041.0 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdmonst.dll | 10.0.10041.0 | Traditional Mongolian (Standard) Keyboard Layout
|
| | kbdmyan.dll | 10.0.10041.0 | Myanmar Keyboard Layout
|
| | kbdne.dll | 10.0.10041.0 | Dutch Keyboard Layout
|
| | kbdnec.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 10.0.10041.0 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 10.0.10041.0 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 10.0.10041.0 | Nepali Keyboard Layout
|
| | kbdnko.dll | 10.0.10041.0 | N'Ko Keyboard Layout
|
| | kbdno.dll | 10.0.10041.0 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 10.0.10041.0 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 10.0.10041.0 | Sesotho sa Leboa Keyboard Layout
|
| | kbdntl.dll | 10.0.10041.0 | New Tai Leu Keyboard Layout
|
| | kbdogham.dll | 10.0.10041.0 | Ogham Keyboard Layout
|
| | kbdolch.dll | 10.0.10041.0 | Ol Chiki Keyboard Layout
|
| | kbdoldit.dll | 10.0.10041.0 | Old Italic Keyboard Layout
|
| | kbdosm.dll | 10.0.10041.0 | Osmanya Keyboard Layout
|
| | kbdpash.dll | 10.0.10041.0 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdpl.dll | 10.0.10041.0 | Polish Keyboard Layout
|
| | kbdpl1.dll | 10.0.10041.0 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 10.0.10041.0 | Portuguese Keyboard Layout
|
| | kbdphags.dll | 10.0.10041.0 | Phags-pa Keyboard Layout
|
| | kbdro.dll | 10.0.10041.0 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 10.0.10041.0 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 10.0.10041.0 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 10.0.10041.0 | Russian Keyboard Layout
|
| | kbdru1.dll | 10.0.10041.0 | Russia(Typewriter) Keyboard Layout
|
| | kbdrum.dll | 10.0.10041.0 | Russian - Mnemonic Keyboard Layout
|
| | kbdsf.dll | 10.0.10041.0 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 10.0.10041.0 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 10.0.10041.0 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 10.0.10041.0 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 10.0.10041.0 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 10.0.10041.0 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 10.0.10041.0 | Sinhala Keyboard Layout
|
| | kbdsora.dll | 10.0.10041.0 | Sora Keyboard Layout
|
| | kbdsorex.dll | 10.0.10041.0 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 10.0.10041.0 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 10.0.10041.0 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 10.0.10041.0 | Spanish Keyboard Layout
|
| | kbdsw.dll | 10.0.10041.0 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 10.0.10041.0 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 10.0.10041.0 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 10.0.10041.0 | Syriac Phoenetic Keyboard Layout
|
| | kbdtaile.dll | 10.0.10041.0 | Tai Le Keyboard Layout
|
| | kbdtajik.dll | 10.0.10041.0 | Tajik Keyboard Layout
|
| | kbdtat.dll | 10.0.10041.0 | Tatar (Legacy) Keyboard Layout
|
| | kbdtifi.dll | 10.0.10041.0 | Tifinagh (Basic) Keyboard Layout
|
| | kbdtifi2.dll | 10.0.10041.0 | Tifinagh (Extended) Keyboard Layout
|
| | kbdtiprc.dll | 10.0.10041.0 | Tibetan (PRC) Keyboard Layout
|
| | kbdtiprd.dll | 10.0.10041.0 | Tibetan (PRC) - Updated Keyboard Layout
|
| | kbdtt102.dll | 10.0.10041.0 | Tatar Keyboard Layout
|
| | kbdtuf.dll | 10.0.10041.0 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 10.0.10041.0 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 10.0.10041.0 | Turkmen Keyboard Layout
|
| | kbdtzm.dll | 10.0.10041.0 | Central Atlas Tamazight Keyboard Layout
|
| | kbdth0.dll | 10.0.10041.0 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 10.0.10041.0 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 10.0.10041.0 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 10.0.10041.0 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdughr.dll | 10.0.10041.0 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 10.0.10041.0 | Uyghur Keyboard Layout
|
| | kbduk.dll | 10.0.10041.0 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 10.0.10041.0 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 10.0.10041.0 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 10.0.10041.0 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 10.0.10041.0 | Urdu Keyboard Layout
|
| | kbdus.dll | 10.0.10041.0 | United States Keyboard Layout
|
| | kbdusa.dll | 10.0.10041.0 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 10.0.10041.0 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 10.0.10041.0 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 10.0.10041.0 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 10.0.10041.0 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 10.0.10041.0 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 10.0.10041.0 | Wolof Keyboard Layout
|
| | kbdyak.dll | 10.0.10041.0 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 10.0.10041.0 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 10.0.10041.0 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 10.0.10041.0 | Serbian (Latin) Keyboard Layout
|
| | kerbclientshared.dll | 10.0.10041.0 | Kerberos Client Shared Functionality
|
| | kerberos.dll | 10.0.10041.0 | Kerberos Security Package
|
| | kernel.appcore.dll | 10.0.10041.0 | AppModel API Host
|
| | kernel32.dll | 10.0.10041.0 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 10.0.10041.0 | Windows NT BASE API Client DLL
|
| | keyboardfiltercore.dll | 10.0.10041.0 | Keyboard Filter Hooks
|
| | keyiso.dll | 10.0.10041.0 | CNG Key Isolation Service
|
| | keymgr.dll | 10.0.10041.0 | Stored User Names and Passwords
|
| | ksuser.dll | 10.0.10041.0 | User CSA Library
|
| | ktmw32.dll | 10.0.10041.0 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 10.0.10041.0 | Policy Storage dll
|
| | l2nacp.dll | 10.0.10041.0 | Windows Onex Credential Provider
|
| | l2sechc.dll | 10.0.10041.0 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.10041.0 | Windows Media Logagent Proxy
|
| | lfsvc.dll | 10.0.10041.0 | Geolocation Service
|
| | licmgr10.dll | 11.0.10041.0 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 10.0.10041.0 | Windows Volume Tracking
|
| | loadperf.dll | 10.0.10041.0 | Load & Unload Performance Counters
|
| | localsec.dll | 10.0.10041.0 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 10.0.10041.0 | Microsoft Windows Location API
|
| | locationframework.dll | 10.0.10041.0 | Windows Geolocation Framework
|
| | locationframeworkinternalps.dll | 10.0.10041.0 | Windows Geolocation Framework Internal PS
|
| | locationframeworkps.dll | 10.0.10041.0 | Windows Geolocation Framework PS
|
| | lockappbroker.dll | 10.0.10041.0 | DLL Trinh cung c?p ?ng d?ng Khoa Windows
|
| | loghours.dll | 10.0.10041.0 | Schedule Dialog
|
| | logoncli.dll | 10.0.10041.0 | Net Logon Client DLL
|
| | logoncontroller.dll | 10.0.10041.0 | B? di?u khi?n UX Dang nh?p
|
| | lpk.dll | 10.0.10041.0 | Language Pack
|
| | lsmproxy.dll | 10.0.10041.0 | LSM interfaces proxy Dll
|
| | luainstall.dll | 10.0.10041.0 | Lua manifest install
|
| | lz32.dll | 10.0.10041.0 | LZ Expand/Compress API DLL
|
| | magnification.dll | 10.0.10041.0 | Microsoft Magnification API
|
| | mapconfiguration.dll | 10.0.10041.0 | ConfigCommon
|
| | mapcontrolcore.dll | 10.0.10041.0 | Map Control Core
|
| | mapcontrolstringsres.dll | 10.0.10041.0 | Chu?i tai nguyen di?u khi?n b?n d?
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapsbtsvc.dll | 10.0.10041.0 | Maps Background Transfer Service
|
| | mbaeapi.dll | 10.0.10041.0 | API Tra?i nghie?m Ta?i khoa?n Bang ro?ng Di do?ng
|
| | mbaeapipublic.dll | 10.0.10041.0 | Mobile Broadband Account API
|
| | mbsmsapi.dll | 10.0.10041.0 | Microsoft Windows Mobile Broadband SMS API
|
| | mbussdapi.dll | 10.0.10041.0 | Microsoft Windows Mobile Broadband USSD API
|
| | mcewmdrmndbootstrap.dll | 1.3.2310.10 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 10.0.10041.0 | Video For Windows MCI driver
|
| | mcicda.dll | 10.0.10041.0 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 10.0.10041.0 | DirectShow MCI Driver
|
| | mciseq.dll | 10.0.10041.0 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 10.0.10041.0 | MCI driver for waveform audio
|
| | mcrecvsrc.dll | 12.0.10041.0 | Miracast Media Foundation Source DLL
|
| | mdminst.dll | 10.0.10041.0 | Modem Class Installer
|
| | mdmregistration.dll | 10.0.10041.0 | MDM Registration DLL
|
| | mf.dll | 12.0.10041.0 | Media Foundation DLL
|
| | mf3216.dll | 10.0.10041.0 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 10.0.10041.0 | Media Foundation AAC Encoder
|
| | mfasfsrcsnk.dll | 12.0.10041.0 | Media Foundation ASF Source and Sink DLL
|
| | mfc100.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc100chs.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100cht.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100deu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100enu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100esn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100fra.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100ita.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100jpn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100kor.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100rus.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100u.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | Thu vie?n Chia se? MFCDLL - Phien ba?n Ba?n le?
|
| | mfc42u.dll | 6.6.8063.0 | Thu vie?n Chia se? MFCDLL - Phien ba?n Ba?n le?
|
| | mfcaptureengine.dll | 12.0.10041.0 | Media Foundation CaptureEngine DLL
|
| | mfcm100.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcore.dll | 12.0.10041.0 | Media Foundation Core DLL
|
| | mfcsubs.dll | 2001.12.10941.0 | COM+
|
| | mfds.dll | 12.0.10041.0 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 10.0.10041.0 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.10041.0 | Media Foundation Error DLL
|
| | mfh263enc.dll | 10.0.10041.0 | Media Foundation h263 Encoder
|
| | mfh264enc.dll | 10.0.10041.0 | Media Foundation H264 Encoder
|
| | mfh265enc.dll | 10.0.10041.0 | Media Foundation H265 Encoder
|
| | mfmediaengine.dll | 10.0.10041.0 | Media Foundation Media Engine DLL
|
| | mfmjpegdec.dll | 10.0.10041.0 | Media Foundation MJPEG Decoder
|
| | mfmkvsrcsnk.dll | 10.0.10041.0 | Media Foundation MKV Media Source and Sink DLL
|
| | mfmp4srcsnk.dll | 12.0.10041.0 | Media Foundation MPEG4 Source and Sink DLL
|
| | mfmpeg2srcsnk.dll | 12.0.10041.0 | Media Foundation MPEG2 Source and Sink DLL
|
| | mfnetcore.dll | 12.0.10041.0 | Media Foundation Net Core DLL
|
| | mfnetsrc.dll | 12.0.10041.0 | Media Foundation Net Source DLL
|
| | mfperfhelper.dll | 12.0.10041.0 | MFPerf DLL
|
| | mfplat.dll | 12.0.10041.0 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.10041.0 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.10041.0 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.10041.0 | Media Foundation ReadWrite DLL
|
| | mfsrcsnk.dll | 12.0.10041.0 | Media Foundation Source and Sink DLL
|
| | mfsvr.dll | 10.0.10041.0 | Media Foundation Simple Video Renderer DLL
|
| | mftranscode.dll | 12.0.10041.0 | Media Foundation Transcode DLL
|
| | mfvdsp.dll | 10.0.10041.0 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 10.0.10041.0 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 10.0.10041.0 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | mi.dll | 10.0.10041.0 | Management Infrastructure
|
| | mibincodec.dll | 10.0.10041.0 | Management Infrastructure binary codec component
|
| | microsoft.management.infrastructure.native.unmanaged.dll | 10.0.10041.0 | Microsoft.Management.Infrastructure.Native.Unmanaged.dll
|
| | microsoftaccountextension.dll | 10.0.10041.0 | Microsoft Account Extension DLL
|
| | microsoftaccounttokenprovider.dll | 10.0.10041.0 | Microsoft® Account Token Provider
|
| | microsoft-windows-mapcontrols.dll | 10.0.10041.0 | Map Event Resources
|
| | microsoft-windows-moshost.dll | 10.0.10041.0 | MosHost Event Resources
|
| | microsoft-windows-mostrace.dll | 10.0.10041.0 | MOS Event Resources
|
| | midimap.dll | 10.0.10041.0 | Microsoft MIDI Mapper
|
| | miguiresource.dll | 10.0.10041.0 | MIG wini32 resources
|
| | migisol.dll | 10.0.10041.0 | Migration System Isolation Layer
|
| | mimefilt.dll | 2008.0.10041.0 | MIME Filter
|
| | mimofcodec.dll | 10.0.10041.0 | Management Infrastructure mof codec component
|
| | minstoreevents.dll | 10.0.10041.0 | Minstore Event Resource
|
| | miracastreceiver.dll | 12.0.10041.0 | Miracast Receiver API
|
| | mirrordrvcompat.dll | 10.0.10041.0 | Mirror Driver Compatibility Helper
|
| | mispace.dll | 10.0.10041.0 | Storage Management Provider for Spaces
|
| | miutils.dll | 10.0.10041.0 | Management Infrastructure
|
| | mlang.dll | 10.0.10041.0 | DLL Ho? tro? Da Ngu?
|
| | mls3.dll | 10.0.10036.0 | Microsoft Neutral Natural Language Server Data and Code
|
| | mmcbase.dll | 10.0.10041.0 | MMC Base DLL
|
| | mmci.dll | 10.0.10041.0 | Media class installer
|
| | mmcico.dll | 10.0.10041.0 | Media class co-installer
|
| | mmcndmgr.dll | 10.0.10041.0 | MMC Node Manager DLL
|
| | mmcshext.dll | 10.0.10041.0 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 10.0.10041.0 | MMDevice API
|
| | mmres.dll | 10.0.10041.0 | General Audio Resources
|
| | modemui.dll | 10.0.10041.0 | Windows Modem Properties
|
| | moricons.dll | 10.0.10041.0 | Windows NT Setup Icon Resources Library
|
| | mos.dll | 10.0.10041.0 | mos
|
| | moshostclient.dll | 10.0.10041.0 | MosHostClient
|
| | mp3dmod.dll | 10.0.10041.0 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 10.0.10041.0 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 10.0.10041.0 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 10.0.10041.0 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 10.0.10041.0 | Multiple Provider Router DLL
|
| | mprapi.dll | 10.0.10041.0 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 10.0.10041.0 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 10.0.10041.0 | Dynamic Interface Manager
|
| | mprext.dll | 10.0.10041.0 | Multiple Provider Router Extension DLL
|
| | mprmsg.dll | 10.0.10041.0 | Multi-Protocol Router Service Messages DLL
|
| | mrmcorer.dll | 10.0.10041.0 | Microsoft Windows MRM
|
| | mrmindexer.dll | 10.0.10041.0 | Microsoft Windows MRM
|
| | ms3dthumbnailprovider.dll | 10.0.10041.0 | 3MF Metadata Handler
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 10.0.10041.0 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 10.0.10041.0 | Microsoft ACM Audio Filter
|
| | msadce.dll | 10.0.10041.0 | OLE DB Cursor Engine
|
| | msadcer.dll | 10.0.10041.0 | OLE DB Cursor Engine Resources
|
| | msadco.dll | 10.0.10041.0 | Remote Data Services Data Control
|
| | msadcor.dll | 10.0.10041.0 | Remote Data Services Data Control Resources
|
| | msadds.dll | 10.0.10041.0 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 10.0.10041.0 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 10.0.10041.0 | ActiveX Data Objects Resources
|
| | msado15.dll | 10.0.10041.0 | ActiveX Data Objects
|
| | msadomd.dll | 10.0.10041.0 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 10.0.10041.0 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 10.0.10041.0 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 10.0.10041.0 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 10.0.10041.0 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msajapi.dll | 10.0.10041.0 | AllJoyn API Library
|
| | msalacdecoder.dll | 10.0.10041.0 | Media Foundation ALAC Decoder
|
| | msalacencoder.dll | 10.0.10041.0 | Media Foundation ALAC Encoder
|
| | msamrnbdecoder.dll | 10.0.10041.0 | AMR Narrowband Decoder DLL
|
| | msamrnbencoder.dll | 10.0.10041.0 | AMR Narrowband Encoder DLL
|
| | msamrnbsink.dll | 10.0.10041.0 | AMR Narrowband Sink DLL
|
| | msamrnbsource.dll | 10.0.10041.0 | AMR Narrowband Source DLL
|
| | msasn1.dll | 10.0.10041.0 | ASN.1 Runtime APIs
|
| | msauddecmft.dll | 10.0.10041.0 | Media Foundation Audio Decoders
|
| | msaudite.dll | 10.0.10041.0 | Security Audit Events DLL
|
| | msauserext.dll | 10.0.10041.0 | MSA USER Extension DLL
|
| | mscandui.dll | 10.0.10041.0 | MSCANDUI Server DLL
|
| | mscat32.dll | 10.0.10041.0 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 10.0.10041.0 | Microsoft Class Mini-driver
|
| | mscms.dll | 10.0.10041.0 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 10.0.10041.0 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 10.0.10041.0 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.8651 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 10.0.10041.0 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 10.0.10041.0 | ODBC Code Page Translator
|
| | msctf.dll | 10.0.10041.0 | MSCTF Server DLL
|
| | msctfmonitor.dll | 10.0.10041.0 | MsCtfMonitor DLL
|
| | msctfp.dll | 10.0.10041.0 | MSCTFP Server DLL
|
| | msctfui.dll | 10.0.10041.0 | MSCTFUI Server DLL
|
| | msctfuimanager.dll | 10.0.10041.0 | Microsoft UIManager DLL
|
| | msdadc.dll | 10.0.10041.0 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 10.0.10041.0 | Built-In Diagnostics
|
| | msdaenum.dll | 10.0.10041.0 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 10.0.10041.0 | OLE DB Error Collection Stub
|
| | msdaora.dll | 10.0.10041.0 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 10.0.10041.0 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 10.0.10041.0 | OLE DB Simple Provider
|
| | msdaprsr.dll | 10.0.10041.0 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 10.0.10041.0 | OLE DB Persistence Services
|
| | msdaps.dll | 10.0.10041.0 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 10.0.10041.0 | OLE DB Remote Provider
|
| | msdaremr.dll | 10.0.10041.0 | OLE DB Remote Provider Resources
|
| | msdart.dll | 10.0.10041.0 | OLE DB Runtime Routines
|
| | msdasc.dll | 10.0.10041.0 | OLE DB Service Components Stub
|
| | msdasql.dll | 10.0.10041.0 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 10.0.10041.0 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 10.0.10041.0 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 10.0.10041.0 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 10.0.10041.0 | OLE DB RootBinder Stub
|
| | msdelta.dll | 10.0.10041.0 | Microsoft Patch Engine
|
| | msdfmap.dll | 10.0.10041.0 | Data Factory Handler
|
| | msdmo.dll | 10.0.10041.0 | DMO Runtime
|
| | msdrm.dll | 10.0.10041.0 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msfeeds.dll | 11.0.10041.0 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 11.0.10041.0 | Microsoft Feeds Background Sync
|
| | msflacdecoder.dll | 10.0.10041.0 | Media Foundation FLAC Decoder
|
| | msflacencoder.dll | 10.0.10041.0 | Media Foundation FLAC Encoder
|
| | msftedit.dll | 10.0.10041.0 | Rich Text Edit Control, v7.5
|
| | mshtml.dll | 11.0.10041.0 | Tri?nh xem HTML cu?a Microsoft (R)
|
| | mshtmldac.dll | 11.0.10041.0 | DAC for Trident DOM
|
| | mshtmled.dll | 11.0.10041.0 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 11.0.10041.0 | DLL Tai nguyen cu?a ca?u pha?n soa?n tha?o HTML cu?a Microsoft®
|
| | msi.dll | 5.0.10041.0 | Windows Installer
|
| | msidcrl40.dll | 10.0.10041.0 | Microsoft® Account Dynamic Link Library
|
| | msident.dll | 10.0.10041.0 | Microsoft Identity Manager
|
| | msidle.dll | 10.0.10041.0 | User Idle Monitor
|
| | msidntld.dll | 10.0.10041.0 | Microsoft Identity Manager
|
| | msieftp.dll | 10.0.10041.0 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.10041.0 | Windows® installer
|
| | msiltcfg.dll | 5.0.10041.0 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 10.0.10041.0 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.10041.0 | Windows® Installer International Messages
|
| | msimtf.dll | 10.0.10041.0 | Active IMM Server DLL
|
| | msisip.dll | 5.0.10041.0 | MSI Signature SIP Provider
|
| | msiwer.dll | 5.0.10041.0 | MSI Windows Error Reporting
|
| | msjet40.dll | 4.0.9765.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9765.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 10.0.10041.0 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | mskeyprotcli.dll | 10.0.10041.0 | Windows Client Key Protection Provider
|
| | mskeyprotect.dll | 10.0.10041.0 | Microsoft Key Protection Provider
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmpeg2adec.dll | 12.0.10031.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 12.0.10041.0 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 12.0.10031.0 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.10041.0 | DRM ActiveX Network Object
|
| | msobjs.dll | 10.0.10041.0 | System object audit names
|
| | msoeacct.dll | 10.0.10041.0 | Microsoft Internet Account Manager
|
| | msoert2.dll | 10.0.10041.0 | Microsoft Windows Mail RT Lib
|
| | msorc32r.dll | 10.0.10041.0 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 10.0.10041.0 | ODBC Driver for Oracle
|
| | mspatcha.dll | 10.0.10041.0 | Microsoft File Patch Application API
|
| | mspatchc.dll | 10.0.10041.0 | Microsoft Patch Creation Engine
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msports.dll | 10.0.10041.0 | Ports Class Installer
|
| | msphotography.dll | 10.0.10041.0 | MS Photography DLL
|
| | msrating.dll | 11.0.10041.0 | DLL Qua?n ly? nguo?i dung cu?c bo? va xe?p ha?ng Internet
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 10.0.10041.0 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 10.0.10041.0 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 10.0.10041.0 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.10041.0 | PKM Perfmon Counter DLL
|
| | msscp.dll | 11.0.10041.0 | Windows Media Secure Content Provider
|
| | msshooks.dll | 7.0.10041.0 | Microsoft Search Hooks
|
| | mssign32.dll | 10.0.10041.0 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 10.0.10041.0 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.10041.0 | mssitlb
|
| | msspellcheckingfacility.dll | 10.0.10041.0 | Microsoft Spell Checking Facility
|
| | mssprxy.dll | 7.0.10041.0 | Microsoft Search Proxy
|
| | mssph.dll | 7.0.10041.0 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.10041.0 | Outlook MSSearch Connector
|
| | mssrch.dll | 7.0.10041.0 | Microsoft Embedded Search
|
| | mssvp.dll | 7.0.10041.0 | MSSearch Vista Platform
|
| | mstask.dll | 10.0.10041.0 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 10.0.10041.0 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 10.0.10041.0 | DLL He? phu?c vu? MSUTB
|
| | msv1_0.dll | 10.0.10041.0 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.10041.0 | Windows NT IOStreams DLL
|
| | msvcp_win.dll | 10.0.10041.0 | Microsoft® C Runtime Library
|
| | msvcp100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcp120_clr0400.dll | 12.0.52504.0 | Microsoft® C Runtime Library
|
| | msvcp60.dll | 7.0.10041.0 | Windows NT C++ Runtime Library DLL
|
| | msvcr100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 14.0.42.0 | Microsoft® .NET Framework
|
| | msvcr120_clr0400.dll | 12.0.52504.0 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.10041.0 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 10.0.10041.0 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 10.0.10041.0 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 10.0.10041.0 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.10041.0 | ActiveX control for streaming video
|
| | msvideodsp.dll | 10.0.10041.0 | Video Stabilization MFT
|
| | msvproc.dll | 12.0.10041.0 | Media Foundation Video Processor
|
| | mswb7.dll | 10.0.10041.0 | MSWB7 DLL
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.10041.0 | Windows Media Device Manager Core
|
| | mswsock.dll | 10.0.10041.0 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9765.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 10.0.10041.0 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.10041.0 | MSXML 3.0
|
| | msxml3r.dll | 8.110.10041.0 | XML Resources
|
| | msxml6.dll | 6.30.10041.0 | MSXML 6.0
|
| | msxml6r.dll | 6.30.10041.0 | XML Resources
|
| | msyuv.dll | 10.0.10041.0 | Microsoft UYVY Video Decompressor
|
| | mtf.dll | |
|
| | mtxclu.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.10941.0 | COM+
|
| | mtxex.dll | 2001.12.10941.0 | COM+
|
| | mtxlegih.dll | 2001.12.10941.0 | COM+
|
| | mtxoci.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 10.0.10041.0 | MUI Callback for font registry settings
|
| | mycomput.dll | 10.0.10041.0 | Computer Management
|
| | mydocs.dll | 10.0.10041.0 | UI Ca?p Tai lie?u cu?a Toi
|
| | napcrypt.dll | 10.0.10041.0 | NAP Cryptographic API helper
|
| | napinsp.dll | 10.0.10041.0 | E-mail Naming Shim Provider
|
| | naturallanguage6.dll | 10.0.10041.0 | Natural Language Development Platform 6
|
| | ncaapi.dll | 10.0.10041.0 | Microsoft Network Connectivity Assistant API
|
| | ncdprop.dll | 10.0.10041.0 | Advanced network device properties
|
| | nci.dll | 10.0.10041.0 | CoInstaller: NET
|
| | ncobjapi.dll | 10.0.10041.0 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 10.0.10041.0 | Windows NCrypt Router
|
| | ncryptprov.dll | 10.0.10041.0 | Microsoft KSP
|
| | ncryptsslp.dll | 10.0.10041.0 | Microsoft SChannel Provider
|
| | nddeapi.dll | 10.0.10041.0 | Network DDE Share Management APIs
|
| | ndfapi.dll | 10.0.10041.0 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 10.0.10041.0 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 10.0.10041.0 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 10.0.10041.0 | NdisCap Notify Object
|
| | ndishc.dll | 10.0.10041.0 | NDIS Helper Classes
|
| | ndproxystub.dll | 10.0.10041.0 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 10.0.10041.0 | NegoExtender Security Package
|
| | netapi32.dll | 10.0.10041.0 | Net Win32 API DLL
|
| | netbios.dll | 10.0.10041.0 | NetBIOS Interface Library
|
| | netcenter.dll | 10.0.10041.0 | Network Center control panel
|
| | netcfgx.dll | 10.0.10041.0 | Do?i tuo?ng Ca?u hi?nh Ma?ng
|
| | netcorehc.dll | 10.0.10041.0 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 10.0.10041.0 | Network Diagnostic Framework
|
| | netevent.dll | 10.0.10041.0 | Net Event Handler
|
| | netfxperf.dll | 10.0.10041.0 | Extensible Performance Counter Shim
|
| | netid.dll | 10.0.10041.0 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 10.0.10041.0 | Netio Helper DLL
|
| | netjoin.dll | 10.0.10041.0 | Domain Join DLL
|
| | netlogon.dll | 10.0.10041.0 | Net Logon Services DLL
|
| | netmsg.dll | 10.0.10041.0 | Net Messages DLL
|
| | netplwiz.dll | 10.0.10041.0 | Map Network Drives/Network Places Wizard
|
| | netprofm.dll | 10.0.10041.0 | Network List Manager
|
| | netprovfw.dll | 10.0.10041.0 | Provisioning Service Framework DLL
|
| | netprovisionsp.dll | 10.0.10041.0 | Provisioning Service Provider DLL
|
| | netsetupapi.dll | 10.0.10041.0 | Network Configuration API
|
| | netsetupshim.dll | 10.0.10041.0 | Network Configuration API
|
| | netshell.dll | 10.0.10041.0 | Network Connections Shell
|
| | netutils.dll | 10.0.10041.0 | Net Win32 API Helpers DLL
|
| | networkexplorer.dll | 10.0.10041.0 | Tham hie?m Ma?ng
|
| | networkitemfactory.dll | 10.0.10041.0 | NetworkItem Factory
|
| | neth.dll | 10.0.10041.0 | Net Help Messages DLL
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | ninput.dll | 10.0.10041.0 | Microsoft Pen and Touch Input Component
|
| | nlaapi.dll | 10.0.10041.0 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.10041.0 | HTML filter
|
| | nlmgp.dll | 10.0.10041.0 | Network List Manager Snapin
|
| | nlmproxy.dll | 10.0.10041.0 | Network List Manager Public Proxy
|
| | nlmsprep.dll | 10.0.10041.0 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 10.0.10041.0 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 10.0.10041.0 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata002a.dll | 10.0.10036.0 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdl.dll | 10.0.10041.0 | Nls Downlevel DLL
|
| | nlslexicons002a.dll | 10.0.10036.0 | Microsoft Neutral Natural Language Server Data and Code
|
| | nmaa.dll | 10.0.10041.0 | NMAA
|
| | nmadirect.dll | 8.1.0.65535 | master branch
|
| | normaliz.dll | 10.0.10041.0 | Unicode Normalization DLL
|
| | notificationobjfactory.dll | 10.0.10041.0 | Notifications Object Factory
|
| | npmproxy.dll | 10.0.10041.0 | Network List Manager Proxy
|
| | nshhttp.dll | 10.0.10041.0 | HTTP netsh DLL
|
| | nshipsec.dll | 10.0.10041.0 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 10.0.10041.0 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 10.0.10041.0 | NSI User-mode interface DLL
|
| | ntasn1.dll | 10.0.10041.0 | Microsoft ASN.1 API
|
| | ntdll.dll | 10.0.10041.0 | NT Layer DLL
|
| | ntdsapi.dll | 10.0.10041.0 | Active Directory Domain Services API
|
| | ntlanman.dll | 10.0.10041.0 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 10.0.10041.0 | Network object shell UI
|
| | ntlmshared.dll | 10.0.10041.0 | NTLM Shared Functionality
|
| | ntmarta.dll | 10.0.10041.0 | Windows NT MARTA provider
|
| | ntprint.dll | 10.0.10041.0 | Spooler Setup DLL
|
| | ntshrui.dll | 10.0.10041.0 | Pha?n mo? ro?ng vo? de? chia se?
|
| | ntvdm64.dll | 10.0.10041.0 | 16-bit Emulation on NT64
|
| | ngcksp.dll | 10.0.10041.0 | Next Generation Credentials Key Storage Provider
|
| | objsel.dll | 10.0.10041.0 | Object Picker Dialog
|
| | occache.dll | 11.0.10041.0 | Tri?nh xem die?u khie?n do?i tuo?ng
|
| | ocsetapi.dll | 10.0.10041.0 | Windows Optional Component Setup API
|
| | odbc32.dll | 10.0.10041.0 | ODBC Driver Manager
|
| | odbcbcp.dll | 10.0.10041.0 | BCP for ODBC
|
| | odbcconf.dll | 10.0.10041.0 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 10.0.10041.0 | ODBC Installer
|
| | odbccr32.dll | 10.0.10041.0 | ODBC Cursor Library
|
| | odbccu32.dll | 10.0.10041.0 | ODBC Cursor Library
|
| | odbcint.dll | 10.0.10041.0 | ODBC Resources
|
| | odbcji32.dll | 10.0.10041.0 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 10.0.10041.0 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 10.0.10041.0 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 10.0.10041.0 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 10.0.10041.0 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 10.0.10041.0 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 10.0.10041.0 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 10.0.10041.0 | ODBC (3.0) driver for text files
|
| | oemlicense.dll | |
|
| | offfilt.dll | 2008.0.10041.0 | OFFICE Filter
|
| | offlinelsa.dll | 10.0.10041.0 | Windows
|
| | offlinesam.dll | 10.0.10041.0 | Windows
|
| | offreg.dll | 10.0.10041.0 | Offline registry DLL
|
| | ogldrv.dll | 10.0.10041.0 | MSOGL
|
| | ole2.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2disp.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2nls.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole32.dll | 10.0.10041.0 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.2.10041.0 | Active Accessibility Core Component
|
| | oleaccrc.dll | 7.2.10041.0 | Active Accessibility Resource DLL
|
| | oleacchooks.dll | 7.2.10041.0 | Active Accessibility Event Hooks Library
|
| | oleaut32.dll | 10.0.10041.0 |
|
| | olecli32.dll | 10.0.10041.0 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 10.0.10041.0 | OLE DB Core Services
|
| | oledb32r.dll | 10.0.10041.0 | OLE DB Core Services Resources
|
| | oledlg.dll | 10.0.10041.0 | OLE User Interface Support
|
| | oleprn.dll | 10.0.10041.0 | Oleprn DLL
|
| | olepro32.dll | 10.0.10041.0 |
|
| | olesvr32.dll | 10.0.10041.0 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 10.0.10041.0 | Microsoft OLE for Windows
|
| | ondemandbrokerclient.dll | 10.0.10041.0 | OnDemandBrokerClient
|
| | ondemandconnroutehelper.dll | 10.0.10041.0 | On Demand Connctiond Route Helper
|
| | onedrivesettingsyncprovider.dll | 10.0.10041.0 | OneDrive Setting Sync
|
| | onex.dll | 10.0.10041.0 | IEEE 802.1X supplicant library
|
| | onexui.dll | 10.0.10041.0 | IEEE 802.1X supplicant UI library
|
| | oobefldr.dll | 10.0.10041.0 | Getting Started
|
| | opcservices.dll | 10.0.10041.0 | Native Code OPC Services Library
|
| | opengl32.dll | 10.0.10041.0 | OpenGL Client DLL
|
| | osbaseln.dll | 10.0.10041.0 | Service Reporting API
|
| | osksupport.dll | 10.0.10041.0 | Microsoft On-Screen Keyboard Support Utilities
|
| | osuninst.dll | 10.0.10041.0 | Uninstall Interface
|
| | p2p.dll | 10.0.10041.0 | Peer-to-Peer Grouping
|
| | p2pgraph.dll | 10.0.10041.0 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 10.0.10041.0 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 10.0.10041.0 | Object Packager2
|
| | packagestateroaming.dll | 10.0.10041.0 | Package State Roaming
|
| | panmap.dll | 10.0.10041.0 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 10.0.10041.0 | Auto Enrollment DLL
|
| | pcacli.dll | 10.0.10041.0 | Program Compatibility Assistant Client Module
|
| | pcaui.dll | 10.0.10041.0 | Program Compatibility Assistant User Interface Module
|
| | pcpksp.dll | 10.0.10041.0 | Microsoft Platform Key Storage Provider for Platform Crypto Provider
|
| | pcptpm12.dll | 10.0.10041.0 | Microsoft Platform Crypto Provider for Trusted Platform Module 1.2
|
| | pcwum.dll | 10.0.10041.0 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 10.0.10041.0 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 10.0.10041.0 | PDH UI
|
| | peerdist.dll | 10.0.10041.0 | BranchCache Client Library
|
| | peerdistsh.dll | 10.0.10041.0 | BranchCache Netshell Helper
|
| | perfctrs.dll | 10.0.10041.0 | Performance Counters
|
| | perfdisk.dll | 10.0.10041.0 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 10.0.10041.0 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 10.0.10041.0 | Windows System Performance Objects DLL
|
| | perfproc.dll | 10.0.10041.0 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 10.0.10041.0 | Windows Remote Desktop Services Performance Objects
|
| | pid.dll | 10.0.10041.0 | Microsoft PID
|
| | pidgenx.dll | 10.0.10041.0 | Pid Generation
|
| | pifmgr.dll | 10.0.10041.0 | Windows NT PIF Manager Icon Resources Library
|
| | pku2u.dll | 10.0.10041.0 | Pku2u Security Package
|
| | pla.dll | 10.0.10041.0 | Performance Logs & Alerts
|
| | playlistfolder.dll | 10.0.10041.0 | Playlist Folder
|
| | playsndsrv.dll | 10.0.10041.0 | PlaySound Service
|
| | playtodevice.dll | 12.0.10041.0 | PLAYTODEVICE DLL
|
| | playtomanager.dll | 10.0.10041.0 | Microsoft Windows PlayTo Manager
|
| | playtomenu.dll | 12.0.10041.0 | PlayTo Menu DLL
|
| | playtoreceiver.dll | 12.0.10041.0 | DLNA DMR DLL
|
| | playtostatusprovider.dll | 10.0.10041.0 | Pha?t de?n Nha? cung ca?p Tra?ng tha?i Dll
|
| | pnrpnsp.dll | 10.0.10041.0 | PNRP Name Space Provider
|
| | pngfilt.dll | 11.0.10041.0 | IE PNG plugin image decoder
|
| | policymanager.dll | 10.0.10041.0 | Policy Manager DLL
|
| | polstore.dll | 10.0.10041.0 | Policy Storage dll
|
| | portabledeviceapi.dll | 10.0.10041.0 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 10.0.10041.0 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 10.0.10041.0 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 10.0.10041.0 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 10.0.10041.0 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 10.0.10041.0 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 10.0.10041.0 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 10.0.10041.0 | Windows Portable Device WMDRM Component
|
| | pots.dll | 10.0.10041.0 | Power Troubleshooter
|
| | powercpl.dll | 10.0.10041.0 | Pa-nen Die?u khie?n Tuy cho?n Nguo?n die?n
|
| | powrprof.dll | 10.0.10041.0 | DLL Bo? Tro? giup Ho? so Nguo?n die?n
|
| | presentationhostproxy.dll | 10.0.10041.0 | Windows Presentation Foundation Host Proxy
|
| | prflbmsg.dll | 10.0.10041.0 | Perflib Event Messages
|
| | printconfig.dll | 0.3.10041.0 | PrintConfig User Interface
|
| | printdialogs.dll | 10.0.10041.0 | Microsoft® Windows® Operating System
|
| | printplatformconfig.dll | 10.0.10041.0 | Legacy Print Platform Adapter
|
| | printui.dll | 10.0.10041.0 | Giao die?n Nguo?i dung Thie?t da?t May in
|
| | prncache.dll | 10.0.10041.0 | Print UI Cache
|
| | prnfldr.dll | 10.0.10041.0 | prnfldr dll
|
| | prnntfy.dll | 10.0.10041.0 | prnntfy DLL
|
| | prntvpt.dll | 10.0.10041.0 | Print Ticket Services Module
|
| | profapi.dll | 10.0.10041.0 | User Profile Basic API
|
| | profext.dll | 10.0.10041.0 | profext
|
| | propsys.dll | 7.0.10041.0 | He? tho?ng So? hu?u cu?a Microsoft
|
| | provcore.dll | 10.0.10041.0 | Microsoft Wireless Provisioning Core
|
| | provsvc.dll | 10.0.10041.0 | Windows HomeGroup
|
| | provthrd.dll | 10.0.10041.0 | WMI Provider Thread & Log Library
|
| | proximitycommon.dll | 10.0.10041.0 | Proximity Common Implementation
|
| | proximitycommonpal.dll | 10.0.10041.0 | Proximity Common PAL
|
| | proximityrtapipal.dll | 10.0.10041.0 | Proximity WinRT API PAL
|
| | prvdmofcomp.dll | 10.0.10041.0 | WMI
|
| | psapi.dll | 10.0.10041.0 | Process Status Helper
|
| | pshed.dll | 10.0.10041.0 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 10.0.10041.0 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | psmodulediscoveryprovider.dll | 10.0.10041.0 | WMI
|
| | pstorec.dll | 10.0.10041.0 | Deprecated Protected Storage COM interfaces
|
| | puiapi.dll | 10.0.10041.0 | puiapi DLL
|
| | puiobj.dll | 10.0.10041.0 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 10.0.10041.0 | pwrshplugin.dll
|
| | photometadatahandler.dll | 10.0.10041.0 | Photo Metadata Handler
|
| | photowiz.dll | 10.0.10041.0 | Thua?t si? In A?nh
|
| | qasf.dll | 12.0.10041.0 | DirectShow ASF Support
|
| | qcap.dll | 10.0.10041.0 | DirectShow Runtime.
|
| | qdv.dll | 10.0.10041.0 | DirectShow Runtime.
|
| | qdvd.dll | 10.0.10041.0 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 10.0.10041.0 | DirectShow Editing.
|
| | qedwipes.dll | 10.0.10041.0 | DirectShow Editing SMPTE Wipes
|
| | qwave.dll | 10.0.10041.0 | Windows NT
|
| | quartz.dll | 10.0.10041.0 | DirectShow Runtime.
|
| | query.dll | 10.0.10041.0 | Content Index Utility DLL
|
| | racpldlg.dll | 10.0.10041.0 | Danh sa?ch Lien he? Tro? giu?p Tu? xa
|
| | radardt.dll | 10.0.10041.0 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 10.0.10041.0 | Microsoft Windows Resource Exhaustion Resolver
|
| | radcui.dll | 10.0.10041.0 | Tha?nh pha?n UI Ke?t no?i Ba?n la?m vie?c va? RemoteApp
|
| | rasadhlp.dll | 10.0.10041.0 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 10.0.10041.0 | Remote Access API
|
| | rascfg.dll | 10.0.10041.0 | RAS Configuration Objects
|
| | rasctrs.dll | 10.0.10041.0 | Windows NT Remote Access Perfmon Counter dll
|
| | raschap.dll | 10.0.10041.0 | Remote Access PPP CHAP
|
| | raschapext.dll | 10.0.10041.0 | Windows Extension library for raschap
|
| | rasdiag.dll | 10.0.10041.0 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 10.0.10041.0 | Remote Access Common Dialog API
|
| | rasgcw.dll | 10.0.10041.0 | RAS Wizard Pages
|
| | rasman.dll | 10.0.10041.0 | Remote Access Connection Manager
|
| | rasmontr.dll | 10.0.10041.0 | RAS Monitor DLL
|
| | rasmxs.dll | 10.0.10041.0 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 10.0.10041.0 | RAS PLAP Credential Provider
|
| | rasppp.dll | 10.0.10041.0 | Remote Access PPP
|
| | rasser.dll | 10.0.10041.0 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 10.0.10041.0 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 10.0.10041.0 | Remote Access PPP EAP-TLS
|
| | rastlsext.dll | 10.0.10041.0 | Windows Extension library for rastls
|
| | rdpcore.dll | 10.0.10041.0 | RDP Core DLL
|
| | rdpencom.dll | 10.0.10041.0 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 10.0.10041.0 | RDP Audio Endpoint
|
| | rdpsaps.dll | 10.0.10041.0 | RDP Session Agent Proxy Stub
|
| | rdvidcrl.dll | 10.0.10041.0 | Remote Desktop Services Client for Microsoft Online Services
|
| | rdvvmtransport.dll | 10.0.10041.0 | RdvVmTransport EndPoints
|
| | reagent.dll | 10.0.10041.0 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 10.0.10041.0 | Registry Configuration APIs
|
| | regctrl.dll | 10.0.10041.0 | RegCtrl
|
| | reinfo.dll | 10.0.10041.0 | Microsoft Windows Recovery Info DLL
|
| | remoteaudioendpoint.dll | 10.0.10041.0 | Remote Audio Endpoint
|
| | remotenaturallanguage.dll | 1.0.0.1 | Speech Client Communication To Backend Speech Services Library.
|
| | remotepg.dll | 10.0.10041.0 | Remote Sessions CPL Extension
|
| | removedevicecontexthandler.dll | 10.0.10041.0 | Bo? xu? ly? Menu Ngu? ca?nh Thie?t bi? Loa?i bo? Ma?y in & Thie?t bi?
|
| | removedeviceelevated.dll | 10.0.10041.0 | RemoveDeviceElevated Proxy Dll
|
| | resampledmo.dll | 10.0.10041.0 | Windows Media Resampler
|
| | resutils.dll | 10.0.10041.0 | Microsoft Cluster Resource Utility DLL
|
| | rfxvmt.dll | 10.0.10041.0 | Microsoft RemoteFX VM Transport
|
| | rgb9rast.dll | 10.0.10041.0 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1231 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 10.0.10041.0 | Wrapper Dll for Richedit 1.0
|
| | rltkapo.dll | 11.0.6000.414 | Realtek(r) LFX/GFX DSP component
|
| | rmclient.dll | 10.0.10041.0 | Resource Manager Client
|
| | rnr20.dll | 10.0.10041.0 | Windows Socket2 NameSpace DLL
|
| | rometadata.dll | 4.6.42.0 | Microsoft MetaData Library
|
| | rpcns4.dll | 10.0.10041.0 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 10.0.10041.0 | RPC Netshell Helper
|
| | rpcrt4.dll | 10.0.10041.0 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 10.0.10041.0 | Remote RPC Extension
|
| | rpchttp.dll | 10.0.10041.0 | RPC HTTP DLL
|
| | rsaenh.dll | 10.0.10041.0 | Microsoft Enhanced Cryptographic Provider
|
| | rshx32.dll | 10.0.10041.0 | Security Shell Extension
|
| | rstrtmgr.dll | 10.0.10041.0 | Restart Manager
|
| | rtffilt.dll | 2008.0.10041.0 | RTF Filter
|
| | rtm.dll | 10.0.10041.0 | Routing Table Manager
|
| | rtmediaframe.dll | 10.0.10041.0 | Windows Runtime MediaFrame DLL
|
| | rtsbastoricon.dll | 1.0.8.0 | Realtek Card Reader Icon Dll
|
| | rtutils.dll | 10.0.10041.0 | Routing Utilities
|
| | rtworkq.dll | 12.0.10041.0 | Realtime WorkQueue DLL
|
| | samcli.dll | 10.0.10041.0 | Security Accounts Manager Client DLL
|
| | samlib.dll | 10.0.10041.0 | SAM Library DLL
|
| | sas.dll | 10.0.10041.0 | WinLogon Software SAS Library
|
| | sbe.dll | 10.0.10041.0 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.10041.0 | Stream Buffer IO DLL
|
| | sberes.dll | 10.0.10041.0 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 10.0.10041.0 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 10.0.10041.0 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 10.0.10041.0 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 10.0.10041.0 | Windows Security Configuration Editor Engine
|
| | scksp.dll | 10.0.10041.0 | Microsoft Smart Card Key Storage Provider
|
| | scripto.dll | 6.6.10041.0 | Microsoft ScriptO
|
| | scrobj.dll | 5.12.10041.0 | Windows ® Script Component Runtime
|
| | scrptadm.dll | 10.0.10041.0 | Script Adm Extension
|
| | scrrun.dll | 5.12.10041.0 | Microsoft ® Script Runtime
|
| | schannel.dll | 10.0.10041.2 | TLS / SSL Security Provider
|
| | schedcli.dll | 10.0.10041.0 | Scheduler Service Client DLL
|
| | sdiageng.dll | 10.0.10041.0 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 10.0.10041.0 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 10.0.10041.0 | NPS SDO Helper Component
|
| | search.protocolhandler.mapi2.dll | 7.0.10041.0 | Microsoft Search Protocol Handler for MAPI2
|
| | searchfolder.dll | 10.0.10041.0 | SearchFolder
|
| | secomn32.dll | 2.0.3.7 | SECOMN.DLL
|
| | secproc.dll | 10.0.10041.0 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 10.0.10041.0 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 10.0.10041.0 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 10.0.10041.0 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 10.0.10041.0 | Security Support Provider Interface
|
| | security.dll | 10.0.10041.0 | Security Support Provider Interface
|
| | sechost.dll | 10.0.10041.0 | Host for SCM/SDDL/LSA Lookup APIs
|
| | sendmail.dll | 10.0.10041.0 | Gu?i Thu
|
| | sensapi.dll | 10.0.10041.0 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 10.0.10041.0 | Sensor API
|
| | sensorscpl.dll | 10.0.10041.0 | Mo? Bo? ca?m u?ng Di?nh vi? va? Kha?c
|
| | sensorsnativeapi.dll | 10.0.10041.0 | Sensors Native API
|
| | sensorsnativeapi.v2.dll | 10.0.10041.0 | Sensors Native API (V2 stack)
|
| | sensorsutilsv2.dll | 10.0.10041.0 | Sensors v2 Utilities DLL
|
| | serialui.dll | 10.0.10041.0 | Serial Port Property Pages
|
| | serwvdrv.dll | 10.0.10041.0 | Unimodem Serial Wave driver
|
| | sessenv.dll | 10.0.10041.0 | Remote Desktop Configuration service
|
| | settingmonitor.dll | 10.0.10041.0 | Setting Synchronization Change Monitor
|
| | settingsync.dll | 10.0.10041.0 | Setting Synchronization
|
| | settingsynccore.dll | 10.0.10041.0 | Setting Synchronization Core
|
| | settingsyncpolicy.dll | 10.0.10041.0 | SettingSync Policy
|
| | setupapi.dll | 10.0.10041.0 | Windows Setup API
|
| | setupcln.dll | 10.0.10041.0 | Setup Files Cleanup
|
| | sfc.dll | 10.0.10041.0 | Windows File Protection
|
| | sfc_os.dll | 10.0.10041.0 | Windows File Protection
|
| | sfcom.dll | 3.0.0.11 | SFCOM.DLL
|
| | shacct.dll | 10.0.10041.0 | Shell Accounts Classes
|
| | sharehost.dll | 10.0.10041.0 | ShareHost
|
| | shcore.dll | 10.0.10041.0 | SHCORE
|
| | shdocvw.dll | 10.0.10041.0 | Thu vie?n die?u khie?n va Do?i tuo?ng Shell Doc
|
| | shell32.dll | 10.0.10041.0 | Dll Chung Vo? cha?n cu?a Windows
|
| | shellstyle.dll | 10.0.10041.0 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 10.0.10041.0 | Shell Folder Service
|
| | shgina.dll | 10.0.10041.0 | Windows Shell User Logon
|
| | shimeng.dll | 10.0.10041.0 | Shim Engine DLL
|
| | shimgvw.dll | 10.0.10041.0 | Photo Gallery Viewer
|
| | shlwapi.dll | 10.0.10041.0 | Thu vie?n Tie?n ich Nhe? cu?a Vo? cha?n
|
| | shpafact.dll | 10.0.10041.0 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 10.0.10041.0 | Shell setup helper
|
| | shsvcs.dll | 10.0.10041.0 | Windows Shell Services Dll
|
| | shunimpl.dll | 10.0.10041.0 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 10.0.10041.0 | Windows Shell Web Services
|
| | signdrv.dll | 10.0.10041.0 | WMI provider for Signed Drivers
|
| | simauth.dll | 10.0.10041.0 | EAP SIM run-time dll
|
| | simcfg.dll | 10.0.10041.0 | EAP SIM config dll
|
| | sisbkup.dll | 10.0.10041.0 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 10.0.10041.0 | Software Licensing Client Dll
|
| | slcext.dll | 10.0.10041.0 | Software Licensing Client Extension Dll
|
| | slpts.dll | 10.0.10041.0 | Sleep Study Troubleshooter
|
| | slwga.dll | 10.0.10041.0 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 10.0.10041.0 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | smphost.dll | 10.0.10041.0 | Storage Management Provider (SMP) host service
|
| | sndvolsso.dll | 10.0.10041.0 | Am luo?ng SCA
|
| | snmpapi.dll | 10.0.10041.0 | SNMP Utility Library
|
| | softkbd.dll | 10.0.10041.0 | Soft Keyboard Server and Tip
|
| | softpub.dll | 10.0.10041.0 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 10.0.10041.0 | Sort Version Server 2003
|
| | sortwindows61.dll | 10.0.10041.0 | SortWindows61 Dll
|
| | sortwindows6compat.dll | 10.0.10041.0 | Sort Version Windows 6.0
|
| | spbcd.dll | 10.0.10041.0 | BCD Sysprep Plugin
|
| | spfileq.dll | 10.0.10041.0 | Windows SPFILEQ
|
| | spinf.dll | 10.0.10041.0 | Windows SPINF
|
| | spnet.dll | 10.0.10041.0 | Net Sysprep Plugin
|
| | spopk.dll | 10.0.10041.0 | OPK Sysprep Plugin
|
| | spp.dll | 10.0.10041.0 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 10.0.10041.0 | Software Licensing Client Dll
|
| | sppcext.dll | 10.0.10041.0 | Software Protection Platform Client Extension Dll
|
| | sppinst.dll | 10.0.10041.0 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 10.0.10041.0 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 10.0.10041.0 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 10.0.10041.0 | Setup Wizard Framework
|
| | spwizimg.dll | 10.0.10041.0 | Setup Wizard Framework Resources
|
| | spwizres.dll | 10.0.10041.0 | Setup Wizard Framework Resources
|
| | spwmp.dll | 10.0.10041.0 | Windows Media Player System Preparation DLL
|
| | sqlcecompact40.dll | 4.0.8275.1 | Database Repair Tool (32-bit)
|
| | sqlceoledb40.dll | 4.0.10041.1 | OLEDB Provider (32-bit)
|
| | sqlceqp40.dll | 4.0.10041.1 | Query Processor (32-bit)
|
| | sqlcese40.dll | 4.0.10041.1 | Storage Engine (32-bit)
|
| | sqloledb.dll | 10.0.10041.0 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 10.0.10041.0 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 2000.80.2039.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 2000.80.2040.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 10.0.10041.0 | XML extensions for SQL Server
|
| | sqmapi.dll | 10.0.10041.0 | SQM Client
|
| | srclient.dll | 10.0.10041.0 | Microsoft® Windows System Restore Client Library
|
| | srcom.dll | 4.0.0.59 | SRCOM.DLL
|
| | srchadmin.dll | 7.0.10041.0 | Indexing Options
|
| | srh.dll | 10.0.10041.0 | Screen Reader Helper DLL
|
| | srhinproc.dll | 10.0.10041.0 | Screen Reader Helper DLL
|
| | srm.dll | 10.0.10041.0 | Microsoft® File Server Resource Manager Common Library
|
| | srm_ps.dll | 10.0.10041.0 | Microsoft® FSRM internal proxy/stub
|
| | srmclient.dll | 10.0.10041.0 | Microsoft® File Server Resource Management Client Extensions
|
| | srmlib.dll | 10.0.10041.0 | Microsoft (R) File Server Resource Management Interop Assembly
|
| | srmscan.dll | 10.0.10041.0 | Microsoft® File Server Storage Reports Scan Engine
|
| | srmshell.dll | 10.0.10041.0 | Microsoft® File Server Resource Management Shell Extension
|
| | srmstormod.dll | 10.0.10041.0 | Microsoft® File Server Resource Management Office Parser
|
| | srmtrace.dll | 10.0.10041.0 | Microsoft® File Server Resource Management Tracing Library
|
| | srpapi.dll | 10.0.10041.0 | SRP APIs Dll
|
| | srpuxnativesnapin.dll | 10.0.10041.0 | Application Control Policies Group Policy Editor Extension
|
| | srumapi.dll | 10.0.10041.0 | System Resource Usage Monitor API
|
| | srumsvc.dll | 10.0.10041.0 | System Resource Usage Monitor Service
|
| | srvcli.dll | 10.0.10041.0 | Server Service Client DLL
|
| | sscore.dll | 10.0.10041.0 | Server Service Core DLL
|
| | ssdpapi.dll | 10.0.10041.0 | SSDP Client API DLL
|
| | sspicli.dll | 10.0.10041.0 | Security Support Provider Interface
|
| | ssshim.dll | 10.0.10041.0 | Windows Componentization Platform Servicing API
|
| | startupscan.dll | 10.0.10041.0 | Startup scan task DLL
|
| | staterepository.core.dll | 10.0.10041.0 | StateRepository Core
|
| | stclient.dll | 2001.12.10941.0 | COM+ Configuration Catalog Client
|
| | sti.dll | 10.0.10041.0 | Still Image Devices client DLL
|
| | stobject.dll | 10.0.10041.0 | Do?i tuo?ng di?ch vu? loi Systray
|
| | storage.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | storagecontexthandler.dll | 10.0.10041.0 | Bo? qua?n ly? Menu Ngu? ca?nh Vu?ng luu tru? Trung tam Thie?t bi?
|
| | storagewmi.dll | 10.0.10041.0 | WMI Provider for Storage Management
|
| | storagewmi_passthru.dll | 10.0.10041.0 | WMI PassThru Provider for Storage Management
|
| | storprop.dll | 10.0.10041.0 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.10041.0 | Structured Query
|
| | sud.dll | 10.0.10041.0 | Pa-nen Die?u khie?n SUD
|
| | suplcsps.dll | 10.0.10041.0 | Windows Supl CSP implementation
|
| | sxproxy.dll | 10.0.10041.0 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 10.0.10041.0 | Fusion 2.5
|
| | sxshared.dll | 10.0.10041.0 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 10.0.10041.0 | Sxs Store DLL
|
| | synccenter.dll | 10.0.10041.0 | Microsoft Sync Center
|
| | synceng.dll | 10.0.10041.0 | Windows Briefcase Engine
|
| | syncinfrastructure.dll | 10.0.10041.0 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 10.0.10041.0 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncreg.dll | 2007.94.10041.0 | Microsoft Synchronization Framework Registration
|
| | syncsettings.dll | 10.0.10041.0 | Do?ng bo? Thi?t da?t
|
| | syncui.dll | 10.0.10041.0 | Windows Briefcase
|
| | synchostps.dll | 10.0.10041.0 | Proxystub for sync host
|
| | syssetup.dll | 10.0.10041.0 | Windows NT System Setup
|
| | systemcpl.dll | 10.0.10041.0 | CPL He? tho?ng cu?a Toi
|
| | systemeventsbrokerclient.dll | 10.0.10041.0 | system Events Broker Client Library
|
| | t2embed.dll | 10.0.10041.0 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 10.0.10041.0 | Microsoft TAPI3
|
| | tapi32.dll | 10.0.10041.0 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 10.0.10041.0 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 10.0.10041.0 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 10.0.10041.0 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 10.0.10041.0 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 10.0.10041.0 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 10.0.10041.0 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 10.0.10041.0 | Task Scheduler COM API
|
| | taskschdps.dll | 10.0.10041.0 | Task Scheduler Interfaces Proxy
|
| | tbauth.dll | 10.0.10041.0 | TBAuth protocol handler
|
| | tbs.dll | 10.0.10041.0 | TBS
|
| | tcpipcfg.dll | 10.0.10041.0 | Network Configuration Objects
|
| | tcpipsetup.dll | 10.0.10041.0 | TCPIP Network Setup Plugin
|
| | tcpmib.dll | 10.0.10041.0 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 10.0.10041.0 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 10.0.10041.0 | Event Trace Helper Library
|
| | termmgr.dll | 10.0.10041.0 | Microsoft TAPI3 Terminal Manager
|
| | tetheringclient.dll | 10.0.10041.0 | Tethering Client
|
| | textinputframework.dll | |
|
| | timebrokerclient.dll | 10.0.10041.0 | Time Broker Client Library
|
| | timedatemuicallback.dll | 10.0.10041.0 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 10.0.10041.0 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tokenbinding.dll | 10.0.10041.0 | Token Binding Protocol
|
| | tokenbroker.dll | 10.0.10041.0 | Token Broker
|
| | tokenbrokerui.dll | 10.0.10041.0 | Token Broker UI
|
| | tpmcertresources.dll | 10.0.10041.0 | TpmCertResources
|
| | tpmcompc.dll | 10.0.10041.0 | Computer Chooser Dialog
|
| | tpmcoreprovisioning.dll | 10.0.10041.0 | TPM Core Provisioning Library
|
| | tquery.dll | 7.0.10041.0 | Microsoft Tripoli Query
|
| | tsbyuv.dll | 10.0.10041.0 | Toshiba Video Codec
|
| | tschannel.dll | 10.0.10041.0 | Task Scheduler Proxy
|
| | tsgqec.dll | 10.0.10041.0 | RD Gateway QEC
|
| | tsmf.dll | 10.0.10041.0 | RDP MF Plugin
|
| | tspkg.dll | 10.0.10041.0 | Web Service Security Package
|
| | tsworkspace.dll | 10.0.10041.0 | RemoteApp and Desktop Connection Component
|
| | ttlsauth.dll | 10.0.10041.0 | EAP TTLS run-time dll
|
| | ttlscfg.dll | 10.0.10041.0 | EAP TTLS configuration dll
|
| | ttlsext.dll | 10.0.10041.0 | Windows Extension library for EAP TTLS
|
| | tvratings.dll | 10.0.10041.0 | Module for managing TV ratings
|
| | twext.dll | 10.0.10041.0 | Previous Versions property page
|
| | twinapi.appcore.dll | 10.0.10041.0 | twinapi.appcore
|
| | twinapi.dll | 10.0.10041.0 | twinapi
|
| | twinui.appcore.dll | 10.0.10041.0 | TWINUI.APPCORE
|
| | twinui.dll | 10.0.10041.0 | TWINUI
|
| | txflog.dll | 2001.12.10941.0 | COM+
|
| | txfw32.dll | 10.0.10041.0 | TxF Win32 DLL
|
| | typelib.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | tzres.dll | 10.0.10041.0 | Time Zones resource DLL
|
| | themecpl.dll | 10.0.10041.0 | CPL Ca nhan hoa
|
| | themeui.dll | 10.0.10041.0 | API Chu? de? cu?a Windows
|
| | threadpoolwinrt.dll | 10.0.10041.0 | Windows WinRT Threadpool
|
| | thumbcache.dll | 10.0.10041.0 | Microsoft Thumbnail Cache
|
| | traffic.dll | 10.0.10041.0 | Microsoft Traffic Control 1.0 DLL
|
| | ucmhc.dll | 10.0.10041.0 | UCM Helper Class
|
| | ucrtbase.dll | 10.0.10041.0 | Microsoft® C Runtime Library
|
| | udhisapi.dll | 10.0.10041.0 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 10.0.10041.0 | eXfat Utility DLL
|
| | ufat.dll | 10.0.10041.0 | FAT Utility DLL
|
| | uianimation.dll | 10.0.10041.0 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.2.10041.0 | Microsoft UI Automation Core
|
| | uiautomationcoreres.dll | 7.2.10041.0 | Microsoft UI Automation Core Resource
|
| | uicom.dll | 10.0.10041.0 | Add/Remove Modems
|
| | uireng.dll | 10.0.10041.0 | UI Recording Engine Library
|
| | uiribbon.dll | 10.0.10041.0 | Khung la?m vie?c Ruy bang Windows
|
| | uiribbonres.dll | 10.0.10041.0 | Windows Ribbon Framework Resources
|
| | ulib.dll | 10.0.10041.0 | File Utilities Support DLL
|
| | umdmxfrm.dll | 10.0.10041.0 | Unimodem Tranform Module
|
| | unimdmat.dll | 10.0.10041.0 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 10.0.10041.0 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | untfs.dll | 10.0.10041.0 | NTFS Utility DLL
|
| | upnp.dll | 10.0.10041.0 | UPnP Control Point API
|
| | upnphost.dll | 10.0.10041.0 | UPnP Device Host
|
| | urefs.dll | 10.0.10041.0 | NTFS Utility DLL
|
| | urefsv1.dll | 10.0.10041.0 | NTFS Utility DLL
|
| | ureg.dll | 10.0.10041.0 | Registry Utility DLL
|
| | url.dll | 11.0.10041.0 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 11.0.10041.0 | Pha?n mo? ro?ng OLE32 cho Win32
|
| | usbceip.dll | 10.0.10041.0 | USBCEIP Task
|
| | usbperf.dll | 10.0.10041.0 | USB Performance Objects DLL
|
| | usbui.dll | 10.0.10041.0 | USB UI Dll
|
| | user32.dll | 10.0.10041.0 | DLL May su? du?ng API NGUO?I DUNG CU?A Windows Da Nguo?i dung
|
| | useraccountcontrolsettings.dll | 10.0.10041.0 | UserAccountControlSettings
|
| | usercpl.dll | 10.0.10041.0 | Pa-nen die?u khie?n nguo?i dung
|
| | userenv.dll | 10.0.10041.0 | Userenv
|
| | userinitext.dll | 10.0.10041.0 | UserInit Utility Extension DLL
|
| | userlanguageprofilecallback.dll | 10.0.10041.0 | MUI Callback for User Language profile changed
|
| | userlanguagescpl.dll | 10.0.10041.0 | Pa-nen Die?u khie?n Ca?u hi?nh Ngon ngu? cu?a Toi
|
| | usermgrcli.dll | 10.0.10041.0 | UserMgr API DLL
|
| | usermgrproxy.dll | 10.0.10041.0 | UserMgrProxy
|
| | usp10.dll | 10.0.10041.0 | Uniscribe Unicode script processor
|
| | ustprov.dll | 10.0.10041.0 | User State WMI Provider
|
| | utildll.dll | 10.0.10041.0 | WinStation utility support DLL
|
| | uudf.dll | 10.0.10041.0 | UDF Utility DLL
|
| | uxinit.dll | 10.0.10041.0 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 10.0.10041.0 | Setup Wizard Framework
|
| | uxlibres.dll | 10.0.10041.0 | UXLib Resources
|
| | uxtheme.dll | 10.0.10041.0 | Microsoft UxTheme Library
|
| | van.dll | 10.0.10041.0 | Xem Ma?ng Sa?n dung
|
| | vault.dll | 10.0.10041.0 | Windows vault Control Panel
|
| | vaultcli.dll | 10.0.10041.0 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbscript.dll | 5.12.10041.0 | Microsoft ® VBScript
|
| | vcomp100.dll | 10.0.40219.325 | Microsoft® C/C++ OpenMP Runtime
|
| | vdmdbg.dll | 10.0.10041.0 | VDMDBG.DLL
|
| | vds_ps.dll | 10.0.10041.0 | Microsoft® Virtual Disk Service proxy/stub
|
| | veeventdispatcher.dll | 10.0.10041.0 | Visual Element Event dispatcher
|
| | verifier.dll | 10.0.10041.0 | Standard application verifier provider dll
|
| | version.dll | 10.0.10041.0 | Version Checking and File Installation Libraries
|
| | vfwwdm32.dll | 10.0.10041.0 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 10.0.10041.0 | Windows Media Resizer
|
| | virtdisk.dll | 10.0.10041.0 | Virtual Disk API DLL
|
| | voiceactivationmanager.dll | 10.0.10041.0 | Windows Voice Activation Manager
|
| | vpnikeapi.dll | 10.0.10041.0 | VPN IKE API's
|
| | vscmgrps.dll | 10.0.10041.0 | Microsoft Virtual Smart Card Manager Proxy/Stub
|
| | vss_ps.dll | 10.0.10041.0 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 10.0.10041.0 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 10.0.10041.0 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 10.0.10041.0 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 10.0.10041.0 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 10.0.10041.0 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 10.0.10041.0 | Microsoft Windows Contacts Sync Provider
|
| | wavemsp.dll | 10.0.10041.0 | Microsoft Wave MSP
|
| | wbemcomn.dll | 10.0.10041.0 | WMI
|
| | wcmapi.dll | 10.0.10041.0 | Windows Connection Manager Client API
|
| | wcnapi.dll | 10.0.10041.0 | Windows Connect Now - API Helper DLL
|
| | wcnwiz.dll | 10.0.10041.0 | Thua?t si? Ke?t no?i Ngay cu?a Windows
|
| | wcspluginservice.dll | 10.0.10041.0 | WcsPlugInService DLL
|
| | wdc.dll | 10.0.10041.0 | Performance Monitor
|
| | wdi.dll | 10.0.10041.0 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 10.0.10041.0 | Microsoft Digest Access
|
| | wdscore.dll | 10.0.10041.0 | Panther Engine Module
|
| | webcamui.dll | 10.0.10041.0 | Microsoft® Windows® Operating System
|
| | webclnt.dll | 10.0.10041.0 | Web DAV Service DLL
|
| | webcheck.dll | 11.0.10041.0 | Gia?m sat trang web
|
| | webio.dll | 10.0.10041.0 | Web Transfer Protocols API
|
| | webservices.dll | 10.0.10041.0 | Windows Web Services Runtime
|
| | websocket.dll | 10.0.10041.0 | Web Socket API
|
| | wecapi.dll | 10.0.10041.0 | Event Collector Configuration API
|
| | wer.dll | 10.0.10041.0 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 10.0.10041.0 | WER Diagnostic Controller
|
| | werui.dll | 10.0.10041.0 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 10.0.10041.0 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 10.0.10041.0 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 10.0.10041.0 | Windows Firewall GPO Helper dll
|
| | wfdprov.dll | 10.0.10041.0 | Private WPS provisioning API DLL for Wi-Fi Direct
|
| | wfhc.dll | 10.0.10041.0 | Windows Firewall Helper Class
|
| | whhelper.dll | 10.0.10041.0 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 10.0.10041.0 | WIA Automation Layer
|
| | wiadefui.dll | 10.0.10041.0 | WIA Scanner Default UI
|
| | wiadss.dll | 10.0.10041.0 | WIA TWAIN compatibility layer
|
| | wiascanprofiles.dll | 10.0.10041.0 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 10.0.10041.0 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 10.0.10041.0 | WIA Tracing
|
| | wimgapi.dll | 10.0.10041.0 | Windows Imaging Library
|
| | winbio.dll | 10.0.10041.0 | Windows Biometrics Client API
|
| | winbioext.dll | 10.0.10041.0 | Windows Biometrics Client Extension API
|
| | winbrand.dll | 10.0.10041.0 | Windows Branding Resources
|
| | wincorlib.dll | 10.0.10041.0 | Microsoft Windows ® WinRT core library
|
| | wincredprovider.dll | 10.0.10041.0 | wincredprovider DLL
|
| | windows.accountscontrol.dll | 10.0.10041.0 | Windows Accounts Control
|
| | windows.applicationmodel.background.systemeventsbroker.dll | 10.0.10041.0 | Windows Background System Events Broker API Server
|
| | windows.applicationmodel.background.timebroker.dll | 10.0.10041.0 | Windows Background Time Broker API Server
|
| | windows.applicationmodel.core.dll | 10.0.10041.0 | Windows Application Model Core API
|
| | windows.applicationmodel.dll | 10.0.10041.0 | Windows ApplicationModel API Server
|
| | windows.applicationmodel.lockscreen.dll | 10.0.10041.0 | Windows Lock Application Framework DLL
|
| | windows.applicationmodel.store.dll | 10.0.10041.0 | Windows Store Runtime DLL
|
| | windows.applicationmodel.store.testingframework.dll | 10.0.10041.0 | Windows Store Testing Framework Runtime DLL
|
| | windows.data.pdf.dll | 10.0.10041.0 | PDF WinRT APIs
|
| | windows.devices.alljoyn.dll | 10.0.10041.0 | Windows.Devices.AllJoyn DLL
|
| | windows.devices.background.dll | 10.0.10041.0 | Windows.Devices.Background
|
| | windows.devices.background.ps.dll | 10.0.10041.0 | Windows.Devices.Background Interface Proxy
|
| | windows.devices.bluetooth.dll | 10.0.10041.0 | Windows.Devices.Bluetooth DLL
|
| | windows.devices.custom.dll | 10.0.10041.0 | Windows.Devices.Custom
|
| | windows.devices.custom.ps.dll | 10.0.10041.0 | Windows.Devices.Custom Interface Proxy
|
| | windows.devices.enumeration.dll | 10.0.10041.0 | Windows.Devices.Enumeration
|
| | windows.devices.humaninterfacedevice.dll | 10.0.10041.0 | Windows.Devices.HumanInterfaceDevice DLL
|
| | windows.devices.lights.dll | 10.0.10041.0 | Windows Runtime Lights DLL
|
| | windows.devices.midi.dll | 10.0.10041.0 | Windows Runtime MIDI Device server DLL
|
| | windows.devices.picker.dll | 10.0.10041.0 | Bo? cho?n Thie?t bi?
|
| | windows.devices.pointofservice.dll | 10.0.10041.0 | Windows Runtime PointOfService DLL
|
| | windows.devices.portable.dll | 10.0.10041.0 | Windows Runtime Portable Devices DLL
|
| | windows.devices.printers.extensions.dll | 10.0.10041.0 | Windows.Devices.Printers.Extensions
|
| | windows.devices.radios.dll | 10.0.10041.0 | Windows.Devices.Radios DLL
|
| | windows.devices.scanners.dll | 10.0.10041.0 | Windows Runtime Devices Scanners DLL
|
| | windows.devices.sensors.dll | 10.0.10041.0 | Windows Runtime Sensors DLL
|
| | windows.devices.serialcommunication.dll | 10.0.10041.0 | Windows.Devices.SerialCommunication DLL
|
| | windows.devices.smartcards.dll | 10.0.10041.0 | The? Thong minh Windows Runtime API DLL
|
| | windows.devices.usb.dll | 10.0.10041.0 | Windows Runtime Usb DLL
|
| | windows.devices.wifi.dll | 10.0.10041.0 | Windows.Devices.WiFi DLL
|
| | windows.devices.wifidirect.dll | 10.0.10041.0 | Windows.Devices.WiFiDirect DLL
|
| | windows.energy.dll | 10.0.10041.0 | Windows Energy Runtime DLL
|
| | windows.globalization.dll | 10.0.10041.0 | Windows Globalization
|
| | windows.globalization.fontgroups.dll | 10.0.10041.0 | Fonts Mapping API
|
| | windows.graphics.dll | 10.0.10041.0 | WinRT Windows Graphics DLL
|
| | windows.graphics.printing.dll | 10.0.10041.0 | Microsoft Windows Printing Support
|
| | windows.internal.bluetooth.dll | 10.0.10041.0 | Windows.Internal.Bluetooth DLL
|
| | windows.management.orchestration.core.dll | 10.0.10041.0 | Windows Runtime Windows Management Orchestration Core DLL
|
| | windows.management.workplace.workplacesettings.dll | 10.0.10041.0 | Windows Runtime WorkplaceSettings DLL
|
| | windows.media.audio.dll | 10.0.10041.0 | Windows Runtime Window Media Audio server DLL
|
| | windows.media.backgroundmediaplayback.dll | 10.0.10041.0 | Windows Media BackgroundMediaPlayback DLL
|
| | windows.media.devices.dll | 10.0.10041.0 | Windows Runtime media device server DLL
|
| | windows.media.dll | 10.0.10041.0 | Windows Media Runtime DLL
|
| | windows.media.editing.dll | 10.0.10041.0 | Windows Media Editing DLL
|
| | windows.media.faceanalysis.dll | 10.0.10041.0 | Microsoft (R) Face Detection DLL
|
| | windows.media.mediacontrol.dll | 10.0.10041.0 | Windows Runtime MediaControl server DLL
|
| | windows.media.ocr.dll | 10.0.10041.0 | Windows OCR Runtime DLL
|
| | windows.media.playback.backgroundmediaplayer.dll | 10.0.10041.0 | Windows Media Playback BackgroundMediaPlayer DLL
|
| | windows.media.playback.mediaplayer.dll | 10.0.10041.0 | Windows Media Playback MediaPlayer DLL
|
| | windows.media.playback.proxystub.dll | 10.0.10041.0 | BackgroundMediaPlayer Proxy Stub DLL
|
| | windows.media.protection.playready.dll | 3.0.2514.0 | Microsoft PlayReady Client Framework Dll
|
| | windows.media.photo.import.dll | 10.0.10041.0 | Windows Photo Import API (WinRT/COM)
|
| | windows.media.speech.dll | 10.0.10041.0 | Windows Speech Runtime DLL
|
| | windows.media.streaming.dll | 12.0.10041.0 | DLNA DLL
|
| | windows.media.streaming.ps.dll | 12.0.10041.0 | DLNA Proxy-Stub DLL
|
| | windows.networking.backgroundtransfer.backgroundmanagerpolicy.dll | 10.0.10041.0 | Background Transfer Background Manager Policy DLL
|
| | windows.networking.backgroundtransfer.dll | 10.0.10041.0 | Windows.Networking.BackgroundTransfer DLL
|
| | windows.networking.connectivity.dll | 10.0.10041.0 | Windows Networking Connectivity Runtime DLL
|
| | windows.networking.dll | 10.0.10041.0 | Windows.Networking DLL
|
| | windows.networking.hostname.dll | 10.0.10041.0 | Windows.Networking.HostName DLL
|
| | windows.networking.networkoperators.hotspotauthentication.dll | 10.0.10041.0 | Microsoft Windows Hotspot Authentication API
|
| | windows.networking.proximity.dll | 10.0.10041.0 | Windows Runtime Proximity API DLL
|
| | windows.networking.sockets.pushenabledapplication.dll | 10.0.10041.0 | Windows.Networking.Sockets.PushEnabledApplication DLL
|
| | windows.security.authentication.onlineid.dll | 10.0.10041.0 | Windows Runtime OnlineId Authentication DLL
|
| | windows.security.authentication.web.core.dll | 10.0.10041.0 | Token Broker WinRT API
|
| | windows.security.credentials.ui.credentialpicker.dll | 10.0.10041.0 | WinRT Credential Picker Server
|
| | windows.security.credentials.ui.userconsentverifier.dll | 10.0.10041.0 | API cu?a bo? kie?m chu?ng su? do?ng y? cu?a nguo?i du?ng Windows
|
| | windows.shell.search.urihandler.dll | 10.0.10041.0 | Windows Search URI Handler
|
| | windows.shell.servicehostbuilder.dll | 10.0.10041.0 | Windows.Shell.ServiceHostBuilder
|
| | windows.staterepository.dll | 10.0.10041.0 | Windows StateRepository API Server
|
| | windows.storage.applicationdata.dll | 10.0.10041.0 | Windows Application Data API Server
|
| | windows.storage.compression.dll | 10.0.10041.0 | WinRT Compression
|
| | windows.storage.dll | 10.0.10041.0 | API Luu tr? WinRT c?a Microsoft
|
| | windows.storage.search.dll | 10.0.10041.0 | Windows.Storage.Search
|
| | windows.system.diagnostics.dll | 10.0.10041.0 | Windows System Diagnostics DLL
|
| | windows.system.profile.hardwareid.dll | 10.0.10041.0 | Windows System Profile HardwareId DLL
|
| | windows.system.profile.retailinfo.dll | 10.0.10041.0 | Windows.System.Profile.RetailInfo Runtime DLL
|
| | windows.system.profile.systemmanufacturers.dll | 10.0.10041.0 | Windows.System.Profile.SystemManufacturers
|
| | windows.system.remotedesktop.dll | 10.0.10041.0 | Windows System RemoteDesktop Runtime DLL
|
| | windows.ui.biofeedback.dll | 10.0.10041.0 | Bio Feedback User Experience
|
| | windows.ui.blockedshutdown.dll | 10.0.10041.0 | Blocked Shutdown User Experience
|
| | windows.ui.core.textinput.dll | 10.0.10041.0 | Windows.UI.Core.TextInput dll
|
| | windows.ui.cred.dll | 10.0.10041.0 | Credential Prompt User Experience
|
| | windows.ui.dll | 10.0.10041.0 | Windows Runtime UI Foundation DLL
|
| | windows.ui.immersive.dll | 10.0.10041.0 | WINDOWS.UI.IMMERSIVE
|
| | windows.ui.input.inking.dll | 10.0.10041.0 | WinRT Windows Inking DLL
|
| | windows.ui.logon.dll | 10.0.10041.0 | Logon User Experience
|
| | windows.ui.search.dll | 10.0.10041.0 | Windows.UI.Search
|
| | windows.ui.xaml.dll | 10.0.10041.0 | Windows.UI.Xaml dll
|
| | windows.ui.xaml.maps.dll | 10.0.10041.0 | Windows UI XAML Maps API
|
| | windows.ui.xaml.phone.dll | 10.0.10041.0 | Windows UI XAML Phone API
|
| | windows.ui.xaml.resources.dll | 10.0.10041.0 | Windows.UI.Xaml.Resources dll
|
| | windows.web.diagnostics.dll | 10.0.10041.0 | Windows.Web.Diagnostics
|
| | windows.web.dll | 10.0.10041.0 | Web Client DLL
|
| | windows.web.http.dll | 10.0.10041.0 | Windows.Web.Http DLL
|
| | windows.world.sensors.dll | |
|
| | windowscodecs.dll | 10.0.10041.0 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 10.0.10041.0 | Microsoft Windows Codecs Extended Library
|
| | windowscodecsraw.dll | 10.0.10041.0 | Microsoft Camera Codec Pack
|
| | windowslivelogin.dll | 10.0.10041.0 | Microsoft® Account Login Helper
|
| | winfax.dll | 10.0.10041.0 | Microsoft Fax API Support DLL
|
| | wininet.dll | 11.0.10041.0 | Pha?n mo? ro?ng Internet cho Win32
|
| | wininitext.dll | 10.0.10041.0 | WinInit Utility Extension DLL
|
| | winipcfile.dll | 10.0.10041.0 | Microsoft Active Directory Rights Management Services File API
|
| | winipcsecproc.dll | 10.0.10041.0 | Microsoft Active Directory Rights Management Services Desktop Security Processor
|
| | winipcsecproc_ssp.dll | 10.0.10041.0 | Microsoft Active Directory Rights Management Services Server Security Processor
|
| | winipsec.dll | 10.0.10041.0 | Windows IPsec SPD Client DLL
|
| | winlangdb.dll | 10.0.10041.0 | Co so? du? lie?u Ngon ngu? Windows Bcp47
|
| | winmde.dll | 12.0.10041.0 | WinMDE DLL
|
| | winmm.dll | 10.0.10041.0 | MCI API DLL
|
| | winmmbase.dll | 10.0.10041.0 | Base Multimedia Extension API DLL
|
| | winmsipc.dll | 10.0.10041.0 | Microsoft Active Directory Rights Management Services Client
|
| | winmsoirmprotector.dll | 10.0.10041.0 | Windows Office file format IRM Protector
|
| | winnlsres.dll | 10.0.10041.0 | DLL ta?i nguyen NLSBuild
|
| | winnsi.dll | 10.0.10041.0 | Network Store Information RPC interface
|
| | winopcirmprotector.dll | 10.0.10041.0 | Windows Office file format IRM Protector
|
| | winrnr.dll | 10.0.10041.0 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 10.0.10041.0 | remtsvc
|
| | winrsmgr.dll | 10.0.10041.0 | WSMan Shell API
|
| | winrssrv.dll | 10.0.10041.0 | winrssrv
|
| | winrttracing.dll | 10.0.10041.0 | Windows Diagnostics Tracing
|
| | winsatapi.dll | 10.0.10041.0 | Windows System Assessment Tool API
|
| | winscard.dll | 10.0.10041.0 | Microsoft Smart Card API
|
| | winshfhc.dll | 10.0.10041.0 | File Risk Estimation
|
| | winsku.dll | 10.0.10041.0 | Windows SKU Library
|
| | winsockhc.dll | 10.0.10041.0 | Winsock Network Diagnostic Helper Class
|
| | winsrpc.dll | 10.0.10041.0 | WINS RPC LIBRARY
|
| | winsta.dll | 10.0.10041.0 | Winstation Library
|
| | winsync.dll | 2007.94.10041.0 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.10041.0 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.10041.0 | Windows Synchronization Provider Framework
|
| | wintypes.dll | 10.0.10041.0 | Windows Base Types DLL
|
| | wintrust.dll | 10.0.10041.0 | Microsoft Trust Verification APIs
|
| | winusb.dll | 10.0.10041.0 | Windows USB Driver User Library
|
| | winhttp.dll | 10.0.10041.0 | Windows HTTP Services
|
| | wisp.dll | 10.0.10041.0 | Microsoft Pen and Touch Input Component
|
| | wkscli.dll | 10.0.10041.0 | Workstation Service Client DLL
|
| | wkspbrokerax.dll | 10.0.10041.0 | Microsoft Workspace Broker ActiveX Control
|
| | wksprtps.dll | 10.0.10041.0 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 10.0.10041.0 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 10.0.10041.0 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 10.0.10041.0 | Luo?ng No?i ke?t Dot11
|
| | wlandlg.dll | 10.0.10041.0 | Thua?t si? Ho?p thoa?i Ma?ng LAN Khong day
|
| | wlaninst.dll | 10.0.10041.0 | Windows NET Device Class Co-Installer for Wireless LAN
|
| | wlanmm.dll | 10.0.10041.0 | Tri?nh qua?n ly? Phi The? thu?c va Phuong tie?n Dot11
|
| | wlanmsm.dll | 10.0.10041.0 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 10.0.10041.0 | Wireless Preferred Networks
|
| | wlansec.dll | 10.0.10041.0 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 10.0.10041.0 | Wireless Profile UI
|
| | wlanutil.dll | 10.0.10041.0 | Windows Wireless LAN 802.11 Utility DLL
|
| | wlangpui.dll | 10.0.10041.0 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 10.0.10041.0 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wldap32.dll | 10.0.10041.0 | Win32 LDAP API DLL
|
| | wlgpclnt.dll | 10.0.10041.0 | 802.11 Group Policy Client
|
| | wlidcli.dll | 10.0.10041.0 | Microsoft® Account Dynamic Link Library
|
| | wlidcredprov.dll | 10.0.10041.0 | Microsoft® Account Credential Provider
|
| | wlidfdp.dll | 10.0.10041.0 | Microsoft® Account Function Discovery Provider
|
| | wlidnsp.dll | 10.0.10041.0 | Microsoft® Account Namespace Provider
|
| | wlidprov.dll | 10.0.10041.0 | Microsoft® Account Provider
|
| | wlidres.dll | 10.0.10041.0 | Ta?i nguyen Microsoft® Windows Live ID
|
| | wls0wndh.dll | 10.0.10041.0 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 10.0.10041.0 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 10.0.10041.0 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.10041.0 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 10.0.10041.0 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.10041.0 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.10041.0 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.10041.0 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.10041.0 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.10041.0 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.10041.0 | Windows Media Error Definitions (English)
|
| | wmi.dll | 10.0.10041.0 | WMI DC and DP functionality
|
| | wmiclnt.dll | 10.0.10041.0 | WMI Client API
|
| | wmidcom.dll | 10.0.10041.0 | WMI
|
| | wmidx.dll | 12.0.10041.0 | Windows Media Indexer DLL
|
| | wmiprop.dll | 10.0.10041.0 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmitomi.dll | 10.0.10041.0 | CIM Provider Adapter
|
| | wmnetmgr.dll | 12.0.10041.0 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.10041.0 | Windows Media Player
|
| | wmpdui.dll | 12.0.10041.0 | Windows Media Player UI Engine
|
| | wmpdxm.dll | 12.0.10041.0 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.10041.0 | Windows Media Player Effects
|
| | wmploc.dll | 12.0.10041.0 | Windows Media Player Resources
|
| | wmpps.dll | 12.0.10041.0 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.10041.0 | Tri?nh kho?i cha?y cu?a Windows Media Player
|
| | wmphoto.dll | 10.0.10041.0 | Windows Media Photo Codec
|
| | wmsgapi.dll | 10.0.10041.0 | WinLogon IPC Client
|
| | wmspdmod.dll | 10.0.10041.0 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 10.0.10041.0 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.10041.0 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 10.0.10041.0 | Windows Media Video Decoder
|
| | wmvdspa.dll | 10.0.10041.0 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 10.0.10041.0 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 10.0.10041.0 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 10.0.10041.0 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 10.0.10041.0 | Windows Media Video Encoder
|
| | wofutil.dll | 10.0.10041.0 | Windows Overlay File System Filter user mode API
|
| | wordbreakers.dll | |
|
| | workfoldersres.dll | 6.2.9200.16384 | Work Folders Resources
|
| | wow32.dll | 10.0.10041.0 | Wow32
|
| | wpc.dll | 10.0.10041.0 | Thu vie?n Thie?t da?t WPC
|
| | wpdshext.dll | 10.0.10041.0 | Pha?n mo? ro?ng Vo? cu?a Thie?t bi? Di do?ng
|
| | wpdshserviceobj.dll | 10.0.10041.0 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 10.0.10041.0 | WMDM Service Provider for Windows Portable Devices
|
| | wpkbdlayout.dll | |
|
| | wpnapps.dll | 10.0.10041.0 | Windows Push Notification Apps
|
| | wpportinglibrary.dll | 10.0.10041.0 | <d> DLL
|
| | ws2_32.dll | 10.0.10041.0 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 10.0.10041.0 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 10.0.10041.0 | Windows Security Center API
|
| | wscinterop.dll | 10.0.10041.0 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 10.0.10041.0 | Windows Security Center ISV API
|
| | wsclient.dll | 10.0.10041.0 | Windows Store Licensing Client
|
| | wscproxystub.dll | 10.0.10041.0 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 10.0.10041.0 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 10.0.10041.0 | WSD Challenge Component
|
| | wsecedit.dll | 10.0.10041.0 | Security Configuration UI Module
|
| | wshbth.dll | 10.0.10041.0 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.12.10041.0 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 10.0.10041.0 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.12.10041.0 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 10.0.10041.0 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 10.0.10041.0 | Windows Sockets Helper DLL
|
| | wshqos.dll | 10.0.10041.0 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 10.0.10041.0 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 10.0.10041.0 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmagent.dll | 10.0.10041.0 | WinRM Agent
|
| | wsmanmigrationplugin.dll | 10.0.10041.0 | WinRM Migration Plugin
|
| | wsmauto.dll | 10.0.10041.0 | WSMAN Automation
|
| | wsmplpxy.dll | 10.0.10041.0 | wsmplpxy
|
| | wsmres.dll | 10.0.10041.0 | WSMan Resource DLL
|
| | wsmsvc.dll | 10.0.10041.0 | WSMan Service
|
| | wsmwmipl.dll | 10.0.10041.0 | WSMAN WMI Provider
|
| | wsnmp32.dll | 10.0.10041.0 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 10.0.10041.0 | Windows Socket 32-Bit DLL
|
| | wsp_fs.dll | 10.0.10041.0 | Windows Storage Provider for FileShare management
|
| | wsp_health.dll | 10.0.10041.0 | Windows Storage Provider for Health Agent API
|
| | wsshared.dll | 10.0.10041.0 | WSShared DLL
|
| | wssync.dll | 10.0.10041.0 | Windows Store Licensing Sync Client
|
| | wtsapi32.dll | 10.0.10041.0 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 10.0.10041.0 | API May su? du?ng cu?a Windows Update
|
| | wudriver.dll | 10.0.10041.0 | Windows Update WUDriver Stub
|
| | wups.dll | 10.0.10041.0 | Windows Update client proxy stub
|
| | wuwebv.dll | 10.0.10041.0 | Windows Update Vista Web Control
|
| | wvc.dll | 10.0.10041.0 | Windows Visual Components
|
| | wwaapi.dll | 10.0.10041.0 | Microsoft Web Application Host API library
|
| | wwaext.dll | 10.0.10041.0 | Microsoft Web Application Host Extension library
|
| | wwanapi.dll | 10.0.10041.0 | Mbnapi
|
| | wwapi.dll | 8.1.10041.0 | WWAN API
|
| | xamldiagnostics.dll | 10.0.10041.0 | Xaml Diagnostics
|
| | xaudio2_8.dll | 10.0.10041.0 | XAudio2 Game Audio API
|
| | xinput1_4.dll | 10.0.10041.0 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 10.0.10041.0 | XNA Common Controller
|
| | xmlfilter.dll | 2008.0.10041.0 | XML Filter
|
| | xmllite.dll | 10.0.10041.0 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 10.0.10041.0 | Network Provisioning Service Client API
|
| | xmlrw.dll | 2011.110.2809.27 | Microsoft XML Slim Library
|
| | xmlrwbin.dll | 2011.110.2809.27 | Microsoft XML Slim Library
|
| | xolehlp.dll | 2001.12.10941.0 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsdocumenttargetprint.dll | 10.0.10041.0 | XPS DocumentTargetPrint DLL
|
| | xpsfilt.dll | 10.0.10041.0 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 10.0.10041.0 | XPS to GDI Converter
|
| | xpsprint.dll | 10.0.10041.0 | XPS Printing DLL
|
| | xpsrasterservice.dll | 10.0.10041.0 | XPS Rasterization Service Component
|
| | xpsservices.dll | 10.0.10041.0 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 10.0.10041.0 | OPC Shell Metadata Handler
|
| | xwizards.dll | 10.0.10041.0 | Extensible Wizards Manager Module
|
| | xwreg.dll | 10.0.10041.0 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 10.0.10041.0 | Bo? tro? Loa?i Thua?t si?Mo? ro?ng duo?c cho DUI
|
| | xwtpw32.dll | 10.0.10041.0 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 10.0.10041.0 | Ca?p Nen (zipped)
|
| | ztrace_ca.dll | 10.0.10041.0 | Ztrace_ca DLL
|
| | ztrace_maps.dll | 10.0.10041.0 | ZTrace Event Resources
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Error | 100 | 2015-04-02 07:01:56 | | Application Error | 1000: Faulting application name: wmplayer.exe, version: 12.0.10041.0, time stamp: 0x5503ab1a Faulting module name: combase.dll, version: 10.0.10041.0, time stamp: 0x5503ada7 Exception code: 0xc0000005 Fault offset: 0x00040d58 Faulting process id: 0x208 Faulting application start time: 0x01d06c87e36db9e0 Faulting application path: C:\Program Files (x86)\Windows Media Player\wmplayer.exe Faulting module path: C:\Windows\SYSTEM32\combase.dll Report Id: 7968f5fd-d8cb-11e4-b62d-74d02b454fd6 Faulting package full name: Faulting package-relative application ID:
|
| | Application | Warning | None | 2015-04-02 08:19:00 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-02 10:19:01 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-02 12:19:02 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-02 14:19:03 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 1 | 2015-04-02 14:26:41 | | ESENT | 490: SettingSyncHost (2680) {6A720D79-6DFE-45D3-969C-1E23846B446C}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read / write access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-02 14:26:41 | | ESENT | 455: SettingSyncHost (2680) {6A720D79-6DFE-45D3-969C-1E23846B446C}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Warning | None | 2015-04-02 16:19:04 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 1 | 2015-04-02 17:04:55 | | ESENT | 489: SettingSyncHost (2680) {C488E449-B76C-47B8-A3BA-ABF92F76D25B}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-02 17:04:56 | | ESENT | 455: SettingSyncHost (2680) {C488E449-B76C-47B8-A3BA-ABF92F76D25B}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Error | 1 | 2015-04-02 17:05:10 | | ESENT | 489: SettingSyncHost (2680) {C488E449-B76C-47B8-A3BA-ABF92F76D25B}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-02 17:05:10 | | ESENT | 455: SettingSyncHost (2680) {C488E449-B76C-47B8-A3BA-ABF92F76D25B}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Warning | None | 2015-04-02 18:58:01 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | 3 | 2015-04-02 18:58:25 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-2416274865-2761320319-549713895-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | None | 2015-04-02 20:58:04 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-03 05:58:49 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-03 05:58:53 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-03 06:22:47 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-03 08:22:48 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-03 10:22:48 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 5973 | 2015-04-03 12:02:45 | Quanravita | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.Windows.Photos_8wekyb3d8bbwe!App failed with error: -2147023170 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-04-03 12:45:23 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-03 19:06:57 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | 3 | 2015-04-03 19:08:32 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-2416274865-2761320319-549713895-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | None | 2015-04-03 21:06:56 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | None | 2015-04-03 21:28:48 | | Microsoft-Windows-CAPI2 | 513: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object. Details: AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol. System Error: Access is denied. .
|
| | Application | Error | None | 2015-04-04 06:11:59 | | System Restore | 8193: Failed to create restore point (Process = C:\Windows\system32\svchost.exe -k netsvcs; Description = Windows Update; Error = 0x81000101).
|
| | Application | Warning | None | 2015-04-04 06:12:09 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007267C AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-04 06:12:32 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-04 06:12:37 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | None | 2015-04-04 06:12:39 | | Microsoft-Windows-CAPI2 | 513: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object. Details: AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol. System Error: Access is denied. .
|
| | Application | Warning | None | 2015-04-04 06:17:03 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Program Files (x86)\Google\Chrome\Application\chrome.exe' (pid 4548) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 06:17:03 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Program Files (x86)\Google\Chrome\Application\chrome.exe' (pid 4548) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 06:17:09 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\explorer.exe' (pid 2724) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 06:17:09 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\SnippingTool.exe' (pid 6136) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 06:17:09 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\explorer.exe' (pid 2724) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 06:17:09 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\SnippingTool.exe' (pid 6136) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\explorer.exe' (pid 2724) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\SettingSyncHost.exe' (pid 2680) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\WinStore\WSHost.exe' (pid 4252) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\InstallAgent.exe' (pid 2152) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Program Files\WindowsApps\Microsoft.Cortana_1.4.2.152_x64__8wekyb3d8bbwe\searchui.exe' (pid 3272) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:30 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\wbem\WmiPrvSE.exe' (pid 6820) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-04 17:11:37 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | 1 | 2015-04-04 17:11:44 | | ESENT | 490: SettingSyncHost (2680) {34FC7967-448E-414F-B16D-9E2C5CF11AB2}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read / write access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-04 17:11:44 | | ESENT | 455: SettingSyncHost (2680) {34FC7967-448E-414F-B16D-9E2C5CF11AB2}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Warning | None | 2015-04-04 17:16:03 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\System32\dwm.exe' (pid 960) cannot be restarted - 1.
|
| | Application | Warning | None | 2015-04-05 05:54:36 | | Wlclntfy | 6004: The winlogon notification subscriber <TrustedInstaller> failed a critical notification event.
|
| | Application | Warning | None | 2015-04-05 05:54:47 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 101 | 2015-04-05 05:58:58 | | Application Hang | 1002: The program searchui.exe version 0.0.0.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel. Process ID: db4 Start Time: 01d06f2a981f98c6 Termination Time: 4294967295 Application Path: C:\Program Files\WindowsApps\Microsoft.Cortana_1.4.2.152_x64__8wekyb3d8bbwe\searchui.exe Report Id: dedfbd78-db1d-11e4-b62f-74d02b454fd6 Faulting package full name: Microsoft.Cortana_1.4.2.152_x64__8wekyb3d8bbwe Faulting package-relative application ID: CortanaUI
|
| | Application | Error | 100 | 2015-04-05 06:06:43 | | Application Error | 1000: Faulting application name: TRANSMAC.EXE, version: 11.2.0.0, time stamp: 0x548efdec Faulting module name: TRANSMAC.EXE, version: 11.2.0.0, time stamp: 0x548efdec Exception code: 0xc0000005 Fault offset: 0x002c4741 Faulting process id: 0x1514 Faulting application start time: 0x01d06f2c03cda05a Faulting application path: C:\Program Files (x86)\TransMac\TRANSMAC.EXE Faulting module path: C:\Program Files (x86)\TransMac\TRANSMAC.EXE Report Id: 41eac29f-db1f-11e4-b62f-74d02b454fd6 Faulting package full name: Faulting package-relative application ID:
|
| | Application | Error | 100 | 2015-04-05 06:06:57 | | Application Error | 1000: Faulting application name: transmac.exe, version: 11.2.0.0, time stamp: 0x548efdec Faulting module name: transmac.exe, version: 11.2.0.0, time stamp: 0x548efdec Exception code: 0xc0000005 Fault offset: 0x002c4741 Faulting process id: 0xddc Faulting application start time: 0x01d06f2bfba4fa60 Faulting application path: C:\Program Files (x86)\TransMac\transmac.exe Faulting module path: C:\Program Files (x86)\TransMac\transmac.exe Report Id: 4a27d632-db1f-11e4-b62f-74d02b454fd6 Faulting package full name: Faulting package-relative application ID:
|
| | Application | Error | 100 | 2015-04-05 06:07:04 | | Application Error | 1000: Faulting application name: TransMac.exe, version: 11.2.0.0, time stamp: 0x548efdec Faulting module name: TransMac.exe, version: 11.2.0.0, time stamp: 0x548efdec Exception code: 0xc0000005 Fault offset: 0x002c4741 Faulting process id: 0x8 Faulting application start time: 0x01d06f2c0e6b3486 Faulting application path: C:\Program Files (x86)\TransMac\TransMac.exe Faulting module path: C:\Program Files (x86)\TransMac\TransMac.exe Report Id: 4e47eecd-db1f-11e4-b62f-74d02b454fd6 Faulting package full name: Faulting package-relative application ID:
|
| | Application | Warning | None | 2015-04-05 06:25:03 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=UserLogon(1)
|
| | Application | Error | 1 | 2015-04-05 06:25:07 | | ESENT | 490: SettingSyncHost (3976) {84A153E7-BABC-489A-A4CB-B2DC6C190DE2}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read / write access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-05 06:25:07 | | ESENT | 455: SettingSyncHost (3976) {84A153E7-BABC-489A-A4CB-B2DC6C190DE2}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Warning | None | 2015-04-05 06:25:07 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | 5973 | 2015-04-05 12:30:37 | Quanravita | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.WindowsDefaultLockScreen_8wekyb3d8bbwe!LockApp failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-04-05 12:30:45 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:30:49 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | 1 | 2015-04-05 12:30:50 | | ESENT | 489: SettingSyncHost (3976) {710C1297-0FC6-476E-8AED-9EE42C8AA939}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-05 12:30:50 | | ESENT | 455: SettingSyncHost (3976) {710C1297-0FC6-476E-8AED-9EE42C8AA939}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Error | 1 | 2015-04-05 12:31:00 | | ESENT | 489: SettingSyncHost (3976) {710C1297-0FC6-476E-8AED-9EE42C8AA939}: An attempt to open the file "C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-04-05 12:31:00 | | ESENT | 455: SettingSyncHost (3976) {710C1297-0FC6-476E-8AED-9EE42C8AA939}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\Quanravita\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Warning | None | 2015-04-05 12:31:47 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:31:54 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | 3 | 2015-04-05 12:32:03 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-2416274865-2761320319-549713895-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | None | 2015-04-05 12:32:18 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:32:35 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:32:40 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:35:08 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 12:35:13 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 14:35:15 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007267C AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-05 18:08:09 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007267C AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-05 18:08:41 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 18:08:47 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-05 20:09:00 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x800705B4 AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 5973 | 2015-04-06 05:57:20 | Quanravita | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.WindowsDefaultLockScreen_8wekyb3d8bbwe!LockApp failed with error: -2147023496 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-04-06 05:57:26 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-06 05:57:33 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-06 11:40:37 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-06 11:40:41 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | 100 | 2015-04-06 12:23:19 | | Application Error | 1000: Faulting application name: Microsoft.Photos.exe, version: 15.307.21020.0, time stamp: 0x54fbf3d3 Faulting module name: PhotosApp.Windows.dll, version: 15.307.21020.0, time stamp: 0x54fbe1c8 Exception code: 0xc0000005 Fault offset: 0x0000000000294b5f Faulting process id: 0x10c0 Faulting application start time: 0x01d07029c9a2e06c Faulting application path: C:\Program Files\WindowsApps\Microsoft.Windows.Photos_15.307.21020.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Faulting module path: C:\Program Files\WindowsApps\Microsoft.Windows.Photos_15.307.21020.0_x64__8wekyb3d8bbwe\PhotosApp.Windows.dll Report Id: 086ec543-dc1d-11e4-b62f-74d02b454fd6 Faulting package full name: Microsoft.Windows.Photos_15.307.21020.0_x64__8wekyb3d8bbwe Faulting package-relative application ID: App
|
| | Application | Warning | None | 2015-04-06 19:23:05 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-06 21:23:05 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Error | 5973 | 2015-04-07 06:07:52 | Quanravita | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.WindowsDefaultLockScreen_8wekyb3d8bbwe!LockApp failed with error: -2147023496 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-04-07 06:08:00 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 07:13:52 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 07:13:57 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 07:26:07 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 07:26:12 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 10:07:11 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 10:36:20 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007232B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 12:36:19 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007267C AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2015-04-07 13:23:24 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 13:23:29 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 13:23:51 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 13:23:57 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:06:41 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:06:45 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:08:17 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:08:21 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:10:10 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:10:13 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:11:39 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 15:11:43 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-07 21:10:53 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Error | 5973 | 2015-04-08 20:42:17 | Quanravita | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.WindowsDefaultLockScreen_8wekyb3d8bbwe!LockApp failed with error: -2147023496 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-04-08 20:42:26 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=NetworkAvailable
|
| | Application | Warning | None | 2015-04-09 06:27:14 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007007B AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Security | Audit Success | 12544 | 2015-04-02 06:44:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 06:44:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:01:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:01:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:17:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:17:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:18:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:18:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:26:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:26:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:26:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:26:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:32:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:32:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 07:49:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 07:49:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 08:02:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 08:02:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 08:19:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 08:19:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 08:19:33 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13824 | 2015-04-02 08:27:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x65da4 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x1628 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 10:19:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 10:19:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 10:19:32 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 11:03:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 11:03:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 11:18:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 11:18:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-02 11:23:09 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x65da4 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xbc4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 12:19:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 12:19:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 12:19:33 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 14:19:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 14:19:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 14:19:36 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 16:19:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 16:19:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 16:19:38 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 17:03:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 17:03:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 17:05:13 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 18:57:58 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {3CD8D937-6E43-464E-B5BB-8559AB91DED8} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 18:57:58 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {3CD8D937-6E43-464E-B5BB-8559AB91DED8} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\f03ae3e3fa4d5d9607a57d839ec76c16_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x40211d9 Linked Logon ID: 0x4021241 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4021241 Linked Logon ID: 0x40211d9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4021996 Linked Logon ID: 0x4021a13 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4021a13 Linked Logon ID: 0x4021996 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x4021a13 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x4021996 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x40211d9 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4021996 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-02 18:58:06 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-02 18:58:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 18:58:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 18:58:44 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-02 19:38:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 19:38:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-02 20:58:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-02 20:58:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-02 20:58:41 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-02 21:01:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471cce8 Linked Logon ID: 0x471cd3f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471cd3f Linked Logon ID: 0x471cce8 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471d074 Linked Logon ID: 0x471d0c6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471d0c6 Linked Logon ID: 0x471d074 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x471d0c6 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x471d074 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471cce8 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x471d074 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-03 05:59:17 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Failure | 12290 | 2015-04-03 05:59:24 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 05:59:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 05:59:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 06:22:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 06:22:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4943fe5 Linked Logon ID: 0x4944037 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4944037 Linked Logon ID: 0x4943fe5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x494465e Linked Logon ID: 0x4944744 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4944744 Linked Logon ID: 0x494465e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x4944744 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x494465e Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x4943fe5 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x494465e Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-03 06:22:49 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-03 06:23:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 06:23:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 06:23:18 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 06:33:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 06:33:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 06:33:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 06:33:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 08:02:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 08:02:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 08:23:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 08:23:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 08:23:25 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 10:23:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 10:23:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 10:23:26 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13824 | 2015-04-03 12:04:07 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x65da4 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x11c4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 12:15:05 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-03 12:45:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 12:45:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 12:46:02 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5219048 Linked Logon ID: 0x521909f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x521909f Linked Logon ID: 0x5219048 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x52196c6 Linked Logon ID: 0x5219737 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5219737 Linked Logon ID: 0x52196c6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5219048 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x52196c6 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-03 12:50:14 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12545 | 2015-04-03 12:50:15 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x5219737 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-03 12:50:15 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x52196c6 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-03 13:49:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e048 Linked Logon ID: 0x561e09a Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e09a Linked Logon ID: 0x561e048 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e6ec Linked Logon ID: 0x561e747 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e747 Linked Logon ID: 0x561e6ec Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x561e747 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x561e6ec Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e048 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x561e6ec Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-03 19:06:54 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-03 19:07:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:07:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 19:07:28 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 19:09:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:09:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 19:34:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:34:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 19:42:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:42:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 19:49:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:49:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 19:50:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 19:50:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 21:07:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 21:07:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-03 21:07:27 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-03 21:28:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 21:28:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:49 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:49 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-03 21:28:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:12:00 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:12:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b3f5f Linked Logon ID: 0x65b3fb1 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b3fb1 Linked Logon ID: 0x65b3f5f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b458e Linked Logon ID: 0x65b4602 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b4602 Linked Logon ID: 0x65b458e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x65b4602 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x65b458e Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b3f5f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x65b458e Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-04 06:12:16 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-04 06:12:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:12:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:12:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13568 | 2015-04-04 06:13:01 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x6616ce0
|
| | Security | Audit Success | 13568 | 2015-04-04 06:13:02 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0xfac Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x6616ce0
|
| | Security | Audit Success | 12544 | 2015-04-04 06:13:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:13:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-04 06:13:10 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 06:14:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:14:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 06:14:22 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5c4 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:14:22 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5c4 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 06:17:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:17:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-04 06:19:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:19:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 06:19:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xdcc Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:19:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xdcc Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 06:22:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:22:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-04 06:22:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:22:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 06:22:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1120 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:22:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1120 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 06:23:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 06:23:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 06:23:14 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfd4 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 06:23:14 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfd4 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:19 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:19 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-04 06:23:20 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947acc Linked Logon ID: 0x6947b26 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947b26 Linked Logon ID: 0x6947acc Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x168 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947ce3 Linked Logon ID: 0x6947d38 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947d38 Linked Logon ID: 0x6947ce3 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x6947d38 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x6947ce3 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947acc Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6947ce3 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-04 17:10:46 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-04 17:11:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:11:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-04-04 17:11:30 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x4cc Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:11:30 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x438 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:11:30 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x440 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:11:30 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x41c Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 12544 | 2015-04-04 17:12:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:12:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-04 17:12:42 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x468 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x590 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x5b4 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x4e4 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\CredProvDataModel.dll Handle ID: 0x440 Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:13:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\CredProvDataModel.dll Handle ID: 0x44c Process Information: Process ID: 0x11e0 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 12544 | 2015-04-04 17:15:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:15:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 17:15:28 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xb9c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:15:28 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xb9c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 17:15:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:15:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-04-04 17:16:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x634 Process Information: Process ID: 0x564 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:16:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x66c Process Information: Process ID: 0x564 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:16:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x628 Process Information: Process ID: 0x564 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-04 17:16:03 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x628 Process Information: Process ID: 0x564 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 12544 | 2015-04-04 17:21:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:21:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 17:21:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x19dc Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:21:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x19dc Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:09 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:23:10 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x11a0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 17:24:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:24:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-04 17:24:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f8 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-04 17:24:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f8 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-04-04 17:25:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:25:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-04 17:26:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:26:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-04 17:41:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-04 17:41:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:35 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x15c New Process Name: ??????????????-??6?4???????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ???????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:35 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x168 New Process Name: ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x15c Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:45 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1f0 New Process Name: ??????????????-??6??c??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x15c Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:45 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1fc New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1f0 Creator Process Name: ????????????????????4? Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x244 New Process Name: ??????????????-??6??c??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x15c Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x24c New Process Name: ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1f0 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x244 Creator Process Name: ????????????????????4? Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x298 New Process Name: ????????????????-??6??4??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x244 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-04-05 05:53:55 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:53:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:55 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2cc New Process Name: ????????????????-??6??c??????????????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ???????????????e?????? Process Command Line: ??????????????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:53:55 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2d4 New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ???????????????e?????? Process Command Line: ??????????????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2015-04-05 05:53:55 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x77ff
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xd2b6 Linked Logon ID: 0xd2f3 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xd2f3 Linked Logon ID: 0xd2b6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xd2b6 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xd2f3 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 101 | 2015-04-05 05:54:05 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-04-05 05:54:06 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:08 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x510 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:08 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x510 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1b424 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x188 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x188 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2015-04-05 05:54:14 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:29 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x51c Process Information: Process ID: 0x4e8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:29 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x538 Process Information: Process ID: 0x4e8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:29 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x3b4 Process Information: Process ID: 0x4e8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:29 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x51c Process Information: Process ID: 0x4e8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10041.0_none_8c8ae1dd7fc64021\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2cc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xac4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x188 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:54:42 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x188 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x38 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x38 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\schannel.dll Handle ID: 0x30 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:48 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\schannel.dll Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\dwmcore.dll Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\BioCredProv.dll Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\dwmcore.dll Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-04-05 05:54:49 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\BioCredProv.dll Handle ID: 0x48 Process Information: Process ID: 0xa70 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 103 | 2015-04-05 05:54:57 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x160 New Process Name: ??????????????-??6?4???????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ???????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x16c New Process Name: ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x160 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:19 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1ac New Process Name: ??????????????-??6??0??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x160 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:23 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x200 New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1ac Creator Process Name: ????????????????????4? Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:23 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x244 New Process Name: ??????????????-??6??0??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x160 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:23 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x24c New Process Name: ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1ac Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:23 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x258 New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x244 Creator Process Name: ????????????????????4? Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:23 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2a8 New Process Name: ????????????????-??6??4??????????????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x244 Creator Process Name: ????????????????????4 Process Command Line: ??????????????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-04-05 05:55:24 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:24 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2dc New Process Name: ????????????????-??6??c??????????????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ???????????????e?????? Process Command Line: ??????????????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-04-05 05:55:24 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2e4 New Process Name: ??????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ???????????????e?????? Process Command Line: ??????????????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2015-04-05 05:55:24 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x7529
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xcf2f Linked Logon ID: 0xcf45 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xcf45 Linked Logon ID: 0xcf2f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xcf2f Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0xcf45 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:31 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x52c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:55:32 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x52c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 05:55:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1af45 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13826 | 2015-04-05 05:55:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:55:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:42 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 13824 | 2015-04-05 05:55:53 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x3fc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 05:55:55 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 05:56:08 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34ca1 Linked Logon ID: 0x34ce6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34ce6 Linked Logon ID: 0x34ca1 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34bd5 Linked Logon ID: 0x34c38 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34c38 Linked Logon ID: 0x34bd5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34ce6 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34ca1 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34ca1 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x34bd5 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 05:56:09 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-04-05 05:56:11 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:56:26 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:56:26 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 05:56:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 05:56:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-05 05:56:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xa4c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 05:56:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xa4c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13824 | 2015-04-05 05:57:39 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34c38 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x558 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 06:06:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 06:06:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 06:24:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 06:24:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 06:25:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 06:25:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-05 06:25:44 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 12:30:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 12:30:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:30:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f5962 Linked Logon ID: 0x6f59b4 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f59b4 Linked Logon ID: 0x6f5962 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f5e6b Linked Logon ID: 0x6f5ebe Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f5ebe Linked Logon ID: 0x6f5e6b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x6f5ebe Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x6f5e6b Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f5962 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x6f5e6b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-05 12:30:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 12:31:32 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e181 Linked Logon ID: 0x76e1d3 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e1d3 Linked Logon ID: 0x76e181 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e5fd Linked Logon ID: 0x76e64f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e64f Linked Logon ID: 0x76e5fd Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x76e64f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x76e5fd Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e181 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x76e5fd Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-05 12:32:37 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-05 12:33:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 12:33:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-05 12:33:12 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13824 | 2015-04-05 12:35:37 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34c38 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x10a4 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 12:35:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 12:35:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-05 12:35:45 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 14:35:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 14:35:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-05 14:35:48 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 18:07:54 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x97521b Linked Logon ID: 0x97526c Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x97526c Linked Logon ID: 0x97521b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x975651 Linked Logon ID: 0x9756a7 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x9756a7 Linked Logon ID: 0x975651 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x9756a7 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x975651 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x97521b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x975651 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-05 18:08:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-05 18:08:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 18:08:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 18:09:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 18:09:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-05 18:09:27 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34c38 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0x868 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Failure | 12290 | 2015-04-05 18:09:54 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 18:18:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 18:18:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:06:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:06:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:09:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:09:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-05 20:09:31 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-05 20:11:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:11:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:12:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:12:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:14:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:14:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:26:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:26:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:31:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:31:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-04-05 20:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f0 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-05 21:04:30 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 05:57:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:25 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169ef01 Linked Logon ID: 0x169ef53 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169ef53 Linked Logon ID: 0x169ef01 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 05:57:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169ef01 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-06 05:57:25 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169f5dd Linked Logon ID: 0x169f62f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169f62f Linked Logon ID: 0x169f5dd Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x169f62f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x169f5dd Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x169f5dd Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-06 05:57:26 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-06 05:58:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 05:58:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-06 05:58:10 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 06:19:42 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188ec8e Linked Logon ID: 0x188ece0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188ece0 Linked Logon ID: 0x188ec8e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188f0b7 Linked Logon ID: 0x188f115 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188f115 Linked Logon ID: 0x188f0b7 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x188f115 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x188f0b7 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188ec8e Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x188f0b7 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-06 11:40:45 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-06 11:41:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 11:41:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-06 11:41:13 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-06 11:43:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 11:43:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-06 12:23:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 12:23:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-06 14:23:45 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f163 Linked Logon ID: 0x229f1b5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f1b5 Linked Logon ID: 0x229f163 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f937 Linked Logon ID: 0x229f9a5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f9a5 Linked Logon ID: 0x229f937 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x229f9a5 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x229f937 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f163 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x229f937 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-06 19:22:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-06 19:23:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 19:23:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-06 19:23:48 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-06 19:25:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-06 19:25:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 06:07:52 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30ee560 Linked Logon ID: 0x30ee5b2 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30ee5b2 Linked Logon ID: 0x30ee560 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30ee9c0 Linked Logon ID: 0x30eea20 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30eea20 Linked Logon ID: 0x30ee9c0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x30eea20 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x30ee9c0 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30ee560 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x30ee9c0 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-07 06:08:01 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-07 06:08:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 06:08:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 06:08:32 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 06:10:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 06:10:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 06:23:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 06:23:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 07:14:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 07:14:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 07:14:28 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 07:26:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 07:26:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 07:26:43 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 07:47:59 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc6653 Linked Logon ID: 0x3dc66a5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc66a5 Linked Logon ID: 0x3dc6653 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc6b44 Linked Logon ID: 0x3dc6ba9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc6ba9 Linked Logon ID: 0x3dc6b44 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x3dc6ba9 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x3dc6b44 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc6653 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x3dc6b44 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-07 10:07:05 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-07 10:07:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 10:07:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 10:07:42 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 10:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 10:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 10:36:52 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 11:40:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 11:40:29 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 11:49:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 11:49:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 12:36:50 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 12:36:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 12:36:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 13:23:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 13:23:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 13:24:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 13:24:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 13:24:29 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13824 | 2015-04-07 15:02:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34c38 Additional Information: Caller Workstation: WIN-8FFL85VFQP9 Target Account Name: Guest Target Account Domain: WIN-8FFL85VFQP9
|
| | Security | Audit Success | 12544 | 2015-04-07 15:07:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 15:07:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 15:07:16 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Failure | 12290 | 2015-04-07 15:08:51 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Failure | 12290 | 2015-04-07 15:10:45 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Failure | 12290 | 2015-04-07 15:12:13 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-07 15:16:04 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x503877e Linked Logon ID: 0x50387d0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x50387d0 Linked Logon ID: 0x503877e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5038b88 Linked Logon ID: 0x5038bdd Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5038bdd Linked Logon ID: 0x5038b88 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x5038bdd Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x5038b88 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x503877e Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5038b88 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-07 21:11:17 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-07 21:11:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 21:11:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-07 21:11:25 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-07 21:13:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 21:13:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-04-07 21:51:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-07 21:51:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 20:42:18 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5349c57 Linked Logon ID: 0x5349ca9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5349ca9 Linked Logon ID: 0x5349c57 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x534a041 Linked Logon ID: 0x534a097 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x534a097 Linked Logon ID: 0x534a041 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x534a097 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x534a041 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5349c57 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x534a041 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-08 20:42:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-08 20:42:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-08 20:42:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-08 20:42:58 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 12544 | 2015-04-08 21:39:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-08 21:39:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {5B4DB2CC-EB1F-458D-A423-44F461018F38} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\8b711d6520f7f86e78c1f3f7b59f7fd0_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {DA4F3D04-6785-4C03-84B4-25805135E372} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\4a3e143eddf8107863ceaf4ffa0a29aa_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-04-08 21:39:16 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: {E30B8337-6B72-45BD-A6B0-921F77FC4236} Key Type: %%2500 Key File Operation Information: File Path: C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\65987e1b454f4da1ae63eae5c5735314_1b3dae85-6ba0-446c-bbcb-d68797095aee Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a83ceb Linked Logon ID: 0x5a83d3d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a83d3d Linked Logon ID: 0x5a83ceb Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x144 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a84162 Linked Logon ID: 0x5a841b5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a841b5 Linked Logon ID: 0x5a84162 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: WIN-8FFL85VFQP9 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x5a841b5 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x5a84162 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a83ceb Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: quanravita@outlook.com.vn Account Domain: MicrosoftAccount Logon ID: 0x5a84162 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-04-09 06:24:14 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Changed Attributes: SAM Account Name: - Display Name: Nguy?n Quang Anh Quan User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-04-09 06:27:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-8FFL85VFQP9$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2dc Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-04-09 06:27:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-04-09 06:27:47 | | Microsoft-Windows-Security-Auditing | 6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error. File Name: \Device\HarddiskVolume4\Windows\System32\WerFaultSecure.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-500 Account Name: Administrator Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-501 Account Name: Guest Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-503 Account Name: DefaultAccount Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 User: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-579 Group Name: Access Control Assistance Operators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-578 Group Name: Hyper-V Administrators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-04-09 06:41:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-2416274865-2761320319-549713895-1001 Account Name: Quanravita Account Domain: WIN-8FFL85VFQP9 Logon ID: 0x34bd5 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0xe08 Process Name: C:\Users\QUANRA~1\AppData\Local\Temp\Rar$EXa0.862\AIDA64.Extreme.5.00.3335.Beta\Setup _ Softnew.net\aida64.exe
|
| | System | Warning | 1014 | 2015-04-02 18:58:02 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-02 18:58:02 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name 3-edge-chat.facebook.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-02 18:58:05 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-03 05:58:51 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-03 05:58:53 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-03 06:22:50 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-03 12:45:26 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-03 19:07:01 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-04 06:12:05 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name wpad timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-04 17:10:48 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-04-05 05:54:03 | | EventLog | 6008: The previous system shutdown at 5:59:45 PM on ?4/?4/?2015 was unexpected.
|
| | System | Warning | 1014 | 2015-04-05 05:54:26 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-04-05 12:30:37 | Quanravita | DCOM | 10010: The server LockApp did not register with DCOM within the required timeout.
|
| | System | Warning | 1014 | 2015-04-05 12:30:47 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name lbhculpxvda timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-05 12:31:58 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-04-05 12:32:20 | | storahci | 129: Reset to device, \Device\RaidPort0, was issued.
|
| | System | Warning | 1014 | 2015-04-05 12:32:29 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-05 12:35:11 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-04-05 18:07:48 | | i8042prt | 17: The device sent an incorrect response(s) following a keyboard reset.
|
| | System | Warning | 1014 | 2015-04-05 18:08:53 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-05 19:54:02 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.googleadservices.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-05 19:55:29 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name vortex-win.data.microsoft.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-04-05 20:07:06 | | Service Control Manager | 7024: The Delivery Optimization service terminated with the following service-specific error: %%2147954407
|
| | System | Error | None | 2015-04-05 20:09:04 | Quanravita | DCOM | 10010: The server {5B99FA76-721C-423C-ADAC-56D03C8A8007} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-04-05 20:11:45 | | Service Control Manager | 7024: The Delivery Optimization service terminated with the following service-specific error: %%2147954407
|
| | System | Error | None | 2015-04-05 20:13:45 | Quanravita | DCOM | 10010: The server {5B99FA76-721C-423C-ADAC-56D03C8A8007} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-04-05 20:26:01 | | Service Control Manager | 7024: The Delivery Optimization service terminated with the following service-specific error: %%2147954407
|
| | System | Error | None | 2015-04-05 20:28:01 | Quanravita | DCOM | 10010: The server {5B99FA76-721C-423C-ADAC-56D03C8A8007} did not register with DCOM within the required timeout.
|
| | System | Warning | 1014 | 2015-04-06 11:40:33 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name wpad timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-06 17:59:17 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-04-06 19:22:19 | | i8042prt | 17: The device sent an incorrect response(s) following a keyboard reset.
|
| | System | Warning | 1014 | 2015-04-06 19:22:20 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name wpad timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-06 19:33:55 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name apis.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 06:08:03 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.facebook.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 06:08:03 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name accounts.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 07:13:55 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 07:25:43 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 07:25:53 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.msftncsi.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 07:26:07 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 10:07:12 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name win8.ipv6.microsoft.com. timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 10:07:13 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.domain.name timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 10:59:17 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.facebook.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-04-07 11:39:12 | | Service Control Manager | 7024: The Delivery Optimization service terminated with the following service-specific error: %%2147954407
|
| | System | Error | None | 2015-04-07 11:41:09 | Quanravita | DCOM | 10010: The server {5B99FA76-721C-423C-ADAC-56D03C8A8007} did not register with DCOM within the required timeout.
|
| | System | Warning | 1014 | 2015-04-07 13:23:48 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name displaycatalog-df.md.mp.microsoft.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 13:23:51 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name ieonlinews.microsoft.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 15:07:54 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name ssl.gstatic.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 15:09:06 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.msftncsi.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | 1014 | 2015-04-07 15:11:29 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.google.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2015-04-08 20:46:11 | | Service Control Manager | 7024: The Delivery Optimization service terminated with the following service-specific error: %%2147943860
|
| | System | Error | None | 2015-04-08 20:48:03 | SYSTEM | DCOM | 10010: The server {5B99FA76-721C-423C-ADAC-56D03C8A8007} did not register with DCOM within the required timeout.
|
| | System | Warning | 1014 | 2015-04-08 20:50:31 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name apis.google.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-04-08 21:39:25 | | storahci | 129: Reset to device, \Device\RaidPort0, was issued.
|