| | | |
|
| | DLL File | Version | Description
|
| | aaclient.dll | 6.2.9200.16384 | Anywhere access client
|
| | accessibilitycpl.dll | 6.2.9200.16384 | Ease of access control panel
|
| | acctres.dll | 6.2.9200.16384 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 6.2.9200.16384 | Access Control List Editor
|
| | aclui.dll | 6.2.9200.16384 | Security Descriptor Editor
|
| | acppage.dll | 6.2.9200.16384 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 6.2.9200.16384 | Action Center
|
| | actioncentercpl.dll | 6.2.9200.16384 | Action Center Control Panel
|
| | activeds.dll | 6.2.9200.16384 | ADs Router Layer DLL
|
| | actxprxy.dll | 6.2.9200.16519 | ActiveX Interface Marshaling Library
|
| | adprovider.dll | 6.2.9200.16384 | adprovider DLL
|
| | adsldp.dll | 6.2.9200.16384 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 6.2.9200.16384 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 6.2.9200.16384 | ADs LDAP Provider DLL
|
| | adsnt.dll | 6.2.9200.16384 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 6.2.9200.16384 | Security Audit Schema DLL
|
| | advapi32.dll | 6.2.9200.16384 | Advanced Windows 32 Base API
|
| | advpack.dll | 10.0.9200.16384 | ADVPACK
|
| | aecache.dll | 6.2.9200.16384 | AECache Sysprep Plugin
|
| | aeevts.dll | 6.2.9200.16384 | Application Experience Event Resources
|
| | amstream.dll | 6.6.9200.16384 | DirectShow Runtime.
|
| | apds.dll | 6.2.9200.16384 | Microsoft® Help Data Services Module
|
| | api-ms-win-appmodel-identity-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-appmodel-runtime-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-appmodel-state-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-base-bootconfig-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-base-util-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-apiquery-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-appcompat-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-appinit-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-atoms-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-bem-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-bicltapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-biplmapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-biptcltapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-com-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-comm-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-com-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-console-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-console-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-crt-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-crt-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-datetime-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-datetime-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-debug-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-debug-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-delayload-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-delayload-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-errorhandling-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-errorhandling-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-fibers-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-fibers-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-fibers-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-firmware-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-handle-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-heap-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-heap-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-heap-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-interlocked-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-interlocked-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-io-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-io-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-job-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-job-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-kernel32-legacy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-kernel32-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-libraryloader-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-libraryloader-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-localregistry-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-memory-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-memory-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-multipleproviderrouter-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-namedpipe-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-namedpipe-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-namespace-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-normalization-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-path-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-privateprofile-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processenvironment-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processenvironment-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processsecurity-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processthreads-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processthreads-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processtopology-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-processtopology-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-profile-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psapi-ansi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psapi-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psm-app-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psm-info-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-psm-plm-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-realtime-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-registry-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-registry-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-registry-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-registryuserspecific-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-rtlsupport-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-rtlsupport-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-shlwapi-legacy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-shlwapi-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-shutdown-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-sidebyside-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-stringansi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-string-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-string-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-stringloader-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-string-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-synch-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-synch-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-sysinfo-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-sysinfo-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-systemtopology-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-legacy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-timezone-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-timezone-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-toolhelp-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-url-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-util-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-versionansi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-version-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-version-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-windowserrorreporting-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-error-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-errorprivate-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-propertysetprivate-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-registration-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-robuffer-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-roparameterizediid-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-winrt-string-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-wow64-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-xstate-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-core-xstate-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-devices-config-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-devices-query-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-devices-swdevice-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-advapi32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-advapi32-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-normaliz-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-ole32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shell32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shlwapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shlwapi-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-user32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-version-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-dx-d3dkmt-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-classicprovider-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-consumer-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-controller-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-legacy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventing-provider-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventlog-legacy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-eventlog-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-gdi-ie-rgn-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-http-time-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-input-ie-interactioncontext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-joystick-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-mci-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-misc-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-misc-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-mme-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-playsound-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-mm-time-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-net-isolation-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-dc-access-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-ie-clipboard-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-ie-message-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-ie-window-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-ie-wmpointer-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-rectangle-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-sysparams-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ntuser-uicontext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ole32-ie-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-power-base-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-power-setting-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-ro-typeresolution-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-activedirectoryclient-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-appcontainer-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-audit-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-base-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-base-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-base-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-credentials-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-credentials-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-grouppolicy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-lsalookup-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-lsalookup-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-lsalookup-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-lsapolicy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-provider-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-sddl-ansi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-sddl-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-sddlparsecond-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-systemfunctions-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-security-trustee-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-core-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-core-l1-1-1.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l2-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-winsvc-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-service-winsvc-l1-2-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-comhelpers-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-obsolete-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-registry-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-scaling-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-stream-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-stream-winrt-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-sysinfo-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-thread-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shcore-unicodeansi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shell-shellcom-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shell-shellfolders-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | api-ms-win-shlwapi-ie-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | apphelp.dll | 6.2.9200.16420 | Application Compatibility Client Library
|
| | apphlpdm.dll | 6.2.9200.16384 | Application Compatibility Help Module
|
| | appidapi.dll | 6.2.9200.16384 | Application Identity APIs Dll
|
| | apprepapi.dll | 6.2.9200.16384 | Application Reputation APIs Dll
|
| | apprepsync.dll | 6.2.9200.16384 | AppRepSync Task
|
| | appxalluserstore.dll | 6.2.9200.16384 | AppX All User Store DLL
|
| | appxdeploymentclient.dll | 6.2.9200.16384 | AppX Deployment Client DLL
|
| | appxpackaging.dll | 6.2.9200.16384 | Native Code Appx Packaging Library
|
| | appxsip.dll | 6.2.9200.16433 | Appx Subject Interface Package
|
| | asferror.dll | 12.0.9200.16384 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.0.30319.17929 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 6.2.9200.16384 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.325 | ATL Module for Windows
|
| | atl110.dll | 11.0.50727.1 | ATL Module for Windows
|
| | atmfd.dll | 5.1.2.236 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.236 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 6.2.9200.16384 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 6.2.9200.16578 | Audio Engine
|
| | audiokse.dll | 6.2.9200.16451 | Audio Ks Endpoint
|
| | audioses.dll | 6.2.9200.16578 | Audio Session
|
| | authbroker.dll | 6.2.9200.16384 | Web Authentication WinRT API
|
| | authext.dll | 6.2.9200.16384 | Authentication Extensions
|
| | authfwcfg.dll | 6.2.9200.16384 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 6.2.9200.16384 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 6.2.9200.16384 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 6.2.9200.16384 | Wizard Framework
|
| | authui.dll | 6.2.9200.16604 | Windows Authentication UI
|
| | authz.dll | 6.2.9200.16384 | Authorization Framework
|
| | autoplay.dll | 6.2.9200.16384 | AutoPlay Control Panel
|
| | auxiliarydisplayapi.dll | 6.2.9200.16384 | Microsoft Windows SideShow API
|
| | auxiliarydisplaycpl.dll | 6.2.9200.16384 | Microsoft Windows SideShow Control Panel
|
| | avicap32.dll | 6.2.9200.16384 | AVI Capture window class
|
| | avifil32.dll | 6.2.9200.16384 | Microsoft AVI File support library
|
| | avrt.dll | 6.2.9200.16420 | Multimedia Realtime Runtime
|
| | azroles.dll | 6.2.9200.16384 | azroles Module
|
| | azroleui.dll | 6.2.9200.16384 | Authorization Manager
|
| | azsqlext.dll | 6.2.9200.16384 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | basecsp.dll | 6.2.9200.16384 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 6.2.9200.16420 | Battery Meter Helper DLL
|
| | bcp47langs.dll | 6.2.9200.16604 | BCP47 Language Classes
|
| | bcrypt.dll | 6.2.9200.16384 | Windows Cryptographic Primitives Library
|
| | bcryptprimitives.dll | 6.2.9200.16384 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 6.2.9200.16384 | Bidispl DLL
|
| | biocredprov.dll | 6.2.9200.16384 | WinBio Credential Provider
|
| | bitsperf.dll | 7.6.9200.16384 | Perfmon Counter Access
|
| | bitsprx2.dll | 7.6.9200.16384 | Background Intelligent Transfer Service Proxy
|
| | bitsprx3.dll | 7.6.9200.16384 | Background Intelligent Transfer Service 2.0 Proxy
|
| | bitsprx4.dll | 7.6.9200.16384 | Background Intelligent Transfer Service 2.5 Proxy
|
| | bitsprx5.dll | 7.6.9200.16384 | Background Intelligent Transfer Service 3.0 Proxy
|
| | bitsprx6.dll | 7.6.9200.16384 | Background Intelligent Transfer Service 4.0 Proxy
|
| | bitsprx7.dll | 7.6.9200.16384 | Background Intelligent Transfer Service 5.0 Proxy
|
| | biwinrt.dll | 6.2.9200.16604 | Windows Background Broker Infrastructure
|
| | blackbox.dll | 11.0.9200.16384 | BlackBox DLL
|
| | bluetoothapis.dll | 6.2.9200.16384 | Bluetooth Usermode Api host
|
| | bootvid.dll | 6.2.9200.16384 | VGA Boot Driver
|
| | browcli.dll | 6.2.9200.16384 | Browser Service Client DLL
|
| | browseui.dll | 6.2.9200.16384 | Shell Browser UI Library
|
| | btpanui.dll | 6.2.9200.16384 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | c_g18030.dll | 6.2.9200.16384 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_is2022.dll | 6.2.9200.16384 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 6.2.9200.16384 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 6.2.9200.16384 | Microsoft® Cabinet File API
|
| | cabview.dll | 6.2.9200.16384 | Cabinet File Viewer Shell Extension
|
| | callbuttons.dll | 6.2.9200.16384 | Windows Runtime CallButtonsServer DLL
|
| | callbuttons.proxystub.dll | 6.2.9200.16384 | Windows Runtime CallButtonsServer ProxyStub DLL
|
| | capiprovider.dll | 6.2.9200.16384 | capiprovider DLL
|
| | capisp.dll | 6.2.9200.16384 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.10130.16384 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.10130.16384 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.10130.16384 | COM+ Configuration Catalog Server Utilities
|
| | cbfsmntntf3.dll | 3.2.114.113 | CbFs Mount Notifier
|
| | cbfsnetrdr3.dll | 3.2.114.192 | Network Redirector
|
| | cca.dll | 6.6.9200.16384 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.9200.16384 | Microsoft CDO for Windows Library
|
| | certca.dll | 6.2.9200.16384 | Microsoft® Active Directory Certificate Services CA
|
| | certcli.dll | 6.2.9200.16384 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 6.2.9200.16384 | Cert Credential Provider
|
| | certenc.dll | 6.2.9200.16384 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 6.2.9200.16384 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 6.2.9200.16384 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 6.2.9200.16384 | Certificates snap-in
|
| | certpoleng.dll | 6.2.9200.16384 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.9200.16384 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 6.2.9200.16384 | Configuration Backend Interface
|
| | cfgmgr32.dll | 6.2.9200.16384 | Configuration Manager DLL
|
| | cfmifs.dll | 6.2.9200.16384 | FmIfs Engine
|
| | cfmifsproxy.dll | 6.2.9200.16384 | Microsoft® FmIfs Proxy Library
|
| | chartv.dll | 6.2.9200.16384 | Chart View
|
| | chsbrkr.dll | 6.2.9200.16384 | Simplified Chinese Word Breaker
|
| | chtbrkr.dll | 6.2.9200.16384 | Chinese Traditional Word Breaker
|
| | chxreadingstringime.dll | 6.2.9200.16384 | CHxReadingStringIME
|
| | cic.dll | 6.2.9200.16384 | CIC - MMC controls for Taskpad
|
| | cis-2.4.dll | |
|
| | clb.dll | 6.2.9200.16384 | Column List Box
|
| | clbcatq.dll | 2001.12.10130.16384 | COM+ Configuration Catalog
|
| | clfsw32.dll | 6.2.9200.16384 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 6.2.9200.16384 | SQL Client Configuration Utility DLL
|
| | clrhost.dll | 6.2.9200.16384 | In Proc server for managed servers in the Windows Runtime
|
| | clusapi.dll | 6.2.9200.16384 | Cluster API Library
|
| | cmcfg32.dll | 7.2.9200.16384 | Microsoft Connection Manager Configuration Dll
|
| | cmdext.dll | 6.2.9200.16384 | cmd.exe Extension DLL
|
| | cmdial32.dll | 7.2.9200.16384 | Microsoft Connection Manager
|
| | cmifw.dll | 6.2.9200.16384 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 6.2.9200.16384 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.9200.16384 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.9200.16384 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.9200.16384 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.9200.16384 | Microsoft Connection Manager Utility Lib
|
| | cngcredui.dll | 6.2.9200.16384 | Microsoft CNG CredUI Provider
|
| | cngprovider.dll | 6.2.9200.16384 | cngprovider DLL
|
| | cnvfat.dll | 6.2.9200.16384 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.10130.16384 | COM+
|
| | colorcnv.dll | 6.2.9200.16384 | Windows Media Color Conversion
|
| | colorui.dll | 6.2.9200.16384 | Microsoft Color Control Panel
|
| | combase.dll | 6.2.9200.16420 | Microsoft COM for Windows
|
| | comcat.dll | 6.2.9200.16384 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.9200.16384 | User Experience Controls Library
|
| | comdlg32.dll | 6.2.9200.16384 | Common Dialogs DLL
|
| | compobj.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | compstui.dll | 6.2.9200.16384 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.10130.16384 | COM+
|
| | comres.dll | 2001.12.10130.16384 | COM+ Resources
|
| | comsnap.dll | 2001.12.10130.16384 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.10130.16384 | COM+ Services
|
| | comuid.dll | 2001.12.10130.16384 | COM+ Explorer UI
|
| | concrt140.dll | 14.0.23506.0 | Microsoft® Concurrency Runtime Library
|
| | connect.dll | 6.2.9200.16384 | Get Connected Wizards
|
| | connectedaccountstate.dll | 6.2.9200.16384 | ConnectedAccountState.dll
|
| | console.dll | 6.2.9200.16384 | Control Panel Console Applet
|
| | cpfilters.dll | 6.6.9200.16384 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credssp.dll | 6.2.9200.16384 | Credential Delegation Security Package
|
| | credui.dll | 6.2.9200.16384 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 6.2.9200.16592 | Crypto API32
|
| | cryptbase.dll | 6.2.9200.16384 | Base cryptographic API DLL
|
| | cryptdlg.dll | 6.2.9200.16569 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 6.2.9200.16384 | Cryptography Manager
|
| | cryptext.dll | 6.2.9200.16384 | Crypto Shell Extensions
|
| | cryptnet.dll | 6.2.9200.16592 | Crypto Network Related API
|
| | cryptowinrt.dll | 6.2.9200.16384 | Crypto WinRT Library
|
| | cryptsp.dll | 6.2.9200.16384 | Cryptographic Service Provider API
|
| | cryptui.dll | 6.2.9200.16384 | Microsoft Trust UI Provider
|
| | cryptuiwizard.dll | 6.2.9200.16384 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 6.2.9200.16384 | XML DigSig API
|
| | cscapi.dll | 6.2.9200.16384 | Offline Files Win32 API
|
| | cscdll.dll | 6.2.9200.16384 | Offline Files Temporary Shim
|
| | csver.dll | 9.3.0.1021 | CSVer
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 6.2.9200.16420 | Microsoft D2D Library
|
| | d3d10.dll | 6.2.9200.16384 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 6.2.9200.16384 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 6.2.9200.16384 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 6.2.9200.16384 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 6.2.9200.16384 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 6.2.9200.16420 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 6.2.9200.16420 | Direct3D 11 Runtime
|
| | d3d8.dll | 6.2.9200.16384 | Microsoft Direct3D
|
| | d3d8thk.dll | 6.2.9200.16384 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 6.2.9200.16384 | Direct3D 9 Runtime
|
| | d3dcompiler_41.dll | 9.26.952.2844 | Direct3D HLSL Compiler
|
| | d3dcompiler_43.dll | 9.29.952.3111 | Direct3D HLSL Compiler
|
| | d3dim.dll | 6.2.9200.16384 | Microsoft Direct3D
|
| | d3dim700.dll | 6.2.9200.16384 | Microsoft Direct3D
|
| | d3dramp.dll | 6.2.9200.16384 | Microsoft Direct3D
|
| | d3dx10_41.dll | 9.26.952.2844 | Direct3D 10.1 Extensions
|
| | d3dx10_42.dll | 9.27.952.3001 | Direct3D 10.1 Extensions
|
| | d3dx11_43.dll | 9.29.952.3111 | Direct3D 10.1 Extensions
|
| | d3dx9_32.dll | 9.16.843.0 | Microsoft® DirectX for Windows®
|
| | d3dxof.dll | 6.2.9200.16384 | DirectX Files DLL
|
| | dafprintprovider.dll | 6.2.9200.16384 | DAF Print Provider DLL
|
| | daotpcredentialprovider.dll | 6.2.9200.16384 | DirectAccess One-Time Password Credential Provider
|
| | dataclen.dll | 6.2.9200.16384 | Disk Space Cleaner for Windows
|
| | davclnt.dll | 6.2.9200.16384 | Web DAV Client DLL
|
| | davhlpr.dll | 6.2.9200.16384 | DAV Helper DLL
|
| | dbgeng.dll | 6.2.9200.16384 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 6.2.9200.16384 | Windows Image Helper
|
| | dbnetlib.dll | 6.2.9200.16384 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 6.2.9200.16384 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 6.2.9200.16453 | DCI Manager
|
| | dcomp.dll | 6.2.9200.16384 | Microsoft DirectComposition Library
|
| | ddaclsys.dll | 6.2.9200.16384 | SysPrep module for Resetting Data Drive ACL
|
| | ddoiproxy.dll | 6.2.9200.16384 | DDOI Interface Proxy
|
| | ddores.dll | 6.2.9200.16384 | Device Category information and resources
|
| | ddraw.dll | 6.2.9200.16384 | Microsoft DirectDraw
|
| | ddrawex.dll | 6.2.9200.16384 | Direct Draw Ex
|
| | delegatorprovider.dll | 6.2.9200.16384 | WMI PassThru Provider for Storage Management
|
| | deskadp.dll | 6.2.9200.16384 | Advanced display adapter properties
|
| | deskmon.dll | 6.2.9200.16384 | Advanced display monitor properties
|
| | devdispitemprovider.dll | 6.2.9200.16384 | DeviceItem inproc devquery subsystem
|
| | devenum.dll | 6.6.9200.16384 | Device enumeration.
|
| | deviceaccess.dll | 6.2.9200.16384 | Device Broker And Policy COM Server
|
| | deviceassociation.dll | 6.2.9200.16384 | Device Association Client DLL
|
| | devicecenter.dll | 6.2.9200.16384 | Device Center
|
| | devicedisplaystatusmanager.dll | 6.2.9200.16384 | Device Display Status Manager
|
| | devicemetadataparsers.dll | 6.2.9200.16384 | Common Device Metadata parsers
|
| | devicepairing.dll | 6.2.9200.16604 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 6.2.9200.16384 | Device Pairing Folder
|
| | devicepairingproxy.dll | 6.2.9200.16384 | Device Pairing Proxy Dll
|
| | deviceuxres.dll | 6.2.9200.16384 | Windows Device User Experience Resource File
|
| | devmgr.dll | 6.2.9200.16384 | Device Manager MMC Snapin
|
| | devobj.dll | 6.2.9200.16384 | Device Information Set DLL
|
| | devrtl.dll | 6.2.9200.16384 | Device Management Run Time Library
|
| | dfscli.dll | 6.2.9200.16384 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 4.0.41209.0 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 6.2.9200.16384 | Distributed File System shell extension
|
| | dgderapi.dll | 1.3.1900.0 | Device Error Recovery SDK(x86)
|
| | dhcpcmonitor.dll | 6.2.9200.16384 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 6.2.9200.16433 | DHCP Client Service
|
| | dhcpcore6.dll | 6.2.9200.16433 | DHCPv6 Client
|
| | dhcpcsvc.dll | 6.2.9200.16433 | DHCP Client Service
|
| | dhcpcsvc6.dll | 6.2.9200.16433 | DHCPv6 Client
|
| | dhcpqec.dll | 6.2.9200.16384 | Microsoft DHCP NAP Enforcement Client
|
| | dhcpsapi.dll | 6.2.9200.16384 | DHCP Server API Stub DLL
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 6.2.9200.16384 | DIMS Job DLL
|
| | dimsroam.dll | 6.2.9200.16384 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 6.2.9200.16384 | Microsoft DirectInput
|
| | dinput8.dll | 6.2.9200.16384 | Microsoft DirectInput
|
| | directdb.dll | 6.2.9200.16384 | Microsoft Direct Database API
|
| | diskcopy.dll | 6.2.9200.16384 | Windows DiskCopy
|
| | dismapi.dll | 6.2.9200.16384 | DISM API Framework
|
| | dispex.dll | 5.8.9200.16384 | Microsoft ® DispEx
|
| | display.dll | 6.2.9200.16384 | Display Control Panel
|
| | dlnashext.dll | 12.0.9200.16384 | DLNA Namespace DLL
|
| | dmband.dll | 6.2.9200.16384 | Microsoft DirectMusic Band
|
| | dmcompos.dll | 6.2.9200.16384 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 6.2.9200.16384 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 6.2.9200.16384 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 6.2.9200.16384 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 6.2.9200.16384 | Disk Management Snap-in Resources
|
| | dmime.dll | 6.2.9200.16384 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 6.2.9200.16384 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 6.2.9200.16384 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 6.2.9200.16384 | TreeView OCX
|
| | dmscript.dll | 6.2.9200.16384 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 6.2.9200.16384 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 6.2.9200.16384 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 6.2.9200.16384 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 6.2.9200.16384 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 6.2.9200.16578 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 6.2.9200.16420 | DNS Client API DLL
|
| | dnscmmc.dll | 6.2.9200.16384 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 6.2.9200.16384 | OLE DocFile Property Page
|
| | dot3api.dll | 6.2.9200.16384 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 6.2.9200.16384 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 6.2.9200.16384 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 6.2.9200.16384 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 6.2.9200.16384 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 6.2.9200.16384 | Dot3 Helper Class
|
| | dot3msm.dll | 6.2.9200.16384 | 802.3 Media Specific Module
|
| | dot3ui.dll | 6.2.9200.16384 | 802.3 Advanced UI
|
| | dpapi.dll | 6.2.9200.16384 | Data Protection API
|
| | dpapiprovider.dll | 6.2.9200.16384 | dpapiprovider DLL
|
| | dplayx.dll | 6.2.9200.16384 | Microsoft DirectPlay
|
| | dpmodemx.dll | 6.2.9200.16384 | Modem and Serial Connection For DirectPlay
|
| | dpnaddr.dll | 6.2.9200.16450 | Microsoft DirectPlay8 Address
|
| | dpnathlp.dll | 6.2.9200.16450 | Microsoft DirectPlay NAT Helper UPnP
|
| | dpnet.dll | 6.2.9200.16450 | Microsoft DirectPlay
|
| | dpnhpast.dll | 6.2.9200.16450 | Microsoft DirectPlay NAT Helper PAST
|
| | dpnhupnp.dll | 6.2.9200.16450 | Microsoft DirectPlay NAT Helper UPNP
|
| | dpnlobby.dll | 6.2.9200.16450 | Microsoft DirectPlay8 Lobby
|
| | dpwsockx.dll | 6.2.9200.16384 | Internet TCP/IP and IPX Connection For DirectPlay
|
| | dpx.dll | 6.2.9200.16384 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.9200.16384 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.9200.16384 | DRMv2 Client DLL
|
| | drprov.dll | 6.2.9200.16384 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 6.2.9200.16384 | Distributed Routing Table
|
| | drtprov.dll | 6.2.9200.16384 | Distributed Routing Table Providers
|
| | drttransport.dll | 6.2.9200.16384 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 6.2.9200.16451 | Driver Store API
|
| | dsauth.dll | 6.2.9200.16384 | DS Authorization for Services
|
| | dsdmo.dll | 6.2.9200.16384 | DirectSound Effects
|
| | dskquota.dll | 6.2.9200.16384 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 6.2.9200.16384 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 6.2.9200.16384 | DirectSound
|
| | dsparse.dll | 6.2.9200.16384 | Active Directory Domain Services API
|
| | dsprop.dll | 6.2.9200.16384 | Windows Active Directory Property Pages
|
| | dsquery.dll | 6.2.9200.16384 | Directory Service Find
|
| | dsrole.dll | 6.2.9200.16384 | DS Setup Client DLL
|
| | dssec.dll | 6.2.9200.16384 | Directory Service Security UI
|
| | dssenh.dll | 6.2.9200.16384 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsui.dll | 6.2.9200.16384 | Device Setup UI Pages
|
| | dsuiext.dll | 6.2.9200.16384 | Directory Service Common UI
|
| | dswave.dll | 6.2.9200.16384 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 6.2.9200.16384 | Detection and Sharing Status API
|
| | dui70.dll | 6.2.9200.16384 | Windows DirectUI Engine
|
| | duser.dll | 6.2.9200.16518 | Windows DirectUser Engine
|
| | dwmapi.dll | 6.2.9200.16384 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 6.2.9200.16433 | Microsoft DWM Core Library
|
| | dwrite.dll | 6.2.9200.16433 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 6.2.9200.16384 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 6.2.9200.16420 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.9200.16420 | Microsoft Windows Media Component Removal File.
|
| | dxptaskringtone.dll | 6.2.9200.16384 | Microsoft Ringtone Editor
|
| | dxptasksync.dll | 6.2.9200.16384 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 10.0.9200.16384 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 10.0.9200.16384 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 6.2.9200.16384 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 6.2.9200.16384 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 6.2.9200.16384 | Eap Peer Config
|
| | eappgnui.dll | 6.2.9200.16384 | EAP Generic UI
|
| | eapphost.dll | 6.2.9200.16384 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 6.2.9200.16384 | Microsoft EAPHost Peer Client DLL
|
| | eapqec.dll | 6.2.9200.16384 | Microsoft EAP NAP Enforcement Client
|
| | easwrt.dll | 6.2.9200.16384 | Exchange ActiveSync Windows Runtime DLL
|
| | efsadu.dll | 6.2.9200.16384 | File Encryption Utility
|
| | efscore.dll | 6.2.9200.16384 | EFS Core Library
|
| | efsutil.dll | 6.2.9200.16384 | EFS Utility Library
|
| | ehstorapi.dll | 6.2.9200.16384 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 6.2.9200.16384 | Microsoft Enhanced Storage Password Manager
|
| | els.dll | 6.2.9200.16384 | Event Viewer Snapin
|
| | elscore.dll | 6.2.9200.16384 | Els Core Platform DLL
|
| | elshyph.dll | 6.2.9200.16384 | ELS Hyphenation Service
|
| | elslad.dll | 6.2.9200.16384 | ELS Language Detection
|
| | elstrans.dll | 6.2.9200.16384 | ELS Transliteration Service
|
| | encapi.dll | 6.2.9200.16384 | Encoder API
|
| | encdec.dll | 6.6.9200.16384 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 6.2.9200.16384 | EQoS Snapin extension
|
| | es.dll | 2001.12.10130.16384 | COM+
|
| | esent.dll | 6.2.9200.16384 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 6.2.9200.16384 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | eventcls.dll | 6.2.9200.16420 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 6.2.9200.16384 | Enhanced Video Renderer DLL
|
| | explorerframe.dll | 6.2.9200.16384 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | ext-ms-win-advapi32-auth-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-encryptedfile-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-eventingcontroller-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-eventlog-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-lsa-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-msi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-ntmarta-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-psm-app-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-registry-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-safer-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-advapi32-shutdown-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-authz-claimpolicies-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-authz-context-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-authz-remote-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-biometrics-winbio-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-bluetooth-deviceassociation-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-branding-winbrand-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-cluster-clusapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-cluster-resutils-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-cmd-util-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-cng-rng-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-com-clbcatq-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-com-ole32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-com-psmregister-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-domainjoin-netjoin-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-firewallapi-webproxy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-fs-clfs-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-fsutilext-ifsutil-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-fsutilext-ulib-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-dc-create-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-dc-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-devcaps-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-draw-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-font-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-metafile-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-path-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-render-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-rgn-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gdi-wcs-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gpapi-grouppolicy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-gui-uxinit-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-appcompat-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-datetime-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-errorhandling-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-file-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-package-current-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-package-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-registry-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-sidebyside-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-transacted-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernel32-windowserrorreporting-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-kernelbase-processthread-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mf-winmm-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mm-msacm-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mm-pehelper-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mm-wmdrmsdk-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mpr-multipleproviderrouter-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-mrmcorer-resmanager-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-msiltcfg-msi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-networking-winipsec-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-newdev-config-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntdsa-activedirectoryserver-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntdsapi-activedirectoryclient-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntos-ksecurity-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntos-ksigningpolicy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntos-tm-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-caret-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-dc-access-ext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-dialogbox-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-draw-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-gui-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-keyboard-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-menu-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-message-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-misc-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-mouse-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-powermanagement-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-private-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-rectangle-ext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-string-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-synch-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-sysparams-ext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-windowclass-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-window-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ntuser-windowstation-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ole32-bindctx-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ole32-clipboard-ie-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ole32-ie-ext-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ole32-oleautomation-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-printer-winspool-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-profile-profsvc-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-profile-userenv-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ras-rasapi32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ras-rasdlg-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ras-rasman-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-ras-tapi32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-rometadata-dispenser-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-samsrv-accountstore-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-scesrv-server-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-secur32-translatename-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-security-credui-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-security-cryptui-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-security-kerberos-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-security-vaultcli-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-session-userinit-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-session-wininit-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-session-winsta-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-session-wtsapi32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-setupapi-cfgmgr32local-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-setupapi-cfgmgr32remote-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-setupapi-classinstallers-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-setupapi-inf-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-setupapi-logging-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-shell32-shellcom-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-shell32-shellfolders-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-shell-propsys-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-shell-shell32-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-shell-shlwapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-smbshare-sscore-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-spinf-inf-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-sxs-oleautomation-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-umpoext-umpo-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-webio-pal-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wer-reporting-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wevtapi-eventlog-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-winhttp-pal-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wininet-pal-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wlan-grouppolicy-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wlan-onexui-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wlan-scard-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wsclient-devlicense-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | ext-ms-win-wwan-wwapi-l1-1-0.dll | 6.2.9200.16384 | ApiSet Stub DLL
|
| | f3ahvoas.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | faultrep.dll | 6.2.9200.16384 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 6.2.9200.16384 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 6.2.9200.16384 | Bluetooth Provider Proxy Dll
|
| | fde.dll | 6.2.9200.16384 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 6.2.9200.16384 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 6.2.9200.16384 | Pnp Provider Dll
|
| | fdproxy.dll | 6.2.9200.16384 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 6.2.9200.16384 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 6.2.9200.16451 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 6.2.9200.16384 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 6.2.9200.16384 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 6.2.9200.16384 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 6.2.9200.16384 | Services and Shared Folders
|
| | findnetprinters.dll | 6.2.9200.16384 | Find Network Printers COM Component
|
| | firewallapi.dll | 6.2.9200.16433 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 6.2.9200.16384 | Windows Firewall Control Panel
|
| | fltlib.dll | 6.2.9200.16384 | Filter Library
|
| | fm20.dll | 15.0.4420.1017 | Microsoft® Forms DLL
|
| | fm20enu.dll | 15.0.4420.1017 | Microsoft® Forms International DLL
|
| | fmifs.dll | 6.2.9200.16578 | FM IFS Utility DLL
|
| | fms.dll | 6.2.9200.16384 | Font Management Services
|
| | fontext.dll | 6.2.9200.16384 | Windows Font Folder
|
| | fontsub.dll | 6.2.9200.16453 | Font Subsetting DLL
|
| | fphc.dll | 6.2.9200.16384 | Filtering Platform Helper Class
|
| | framedyn.dll | 6.2.9200.16384 | WMI SDK Provider Framework
|
| | framedynos.dll | 6.2.9200.16384 | WMI SDK Provider Framework
|
| | frprov.dll | 6.2.9200.16384 | Folder Redirection WMI Provider
|
| | fsutilext.dll | 6.2.9200.16384 | FS Utility Extension DLL
|
| | fundisc.dll | 6.2.9200.16384 | Function Discovery Dll
|
| | fwcfg.dll | 6.2.9200.16384 | Windows Firewall Configuration Helper
|
| | fwpuclnt.dll | 6.2.9200.16465 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 6.2.9200.16384 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 6.2.9200.16384 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 6.2.9200.16384 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 6.2.9200.16384 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 6.2.9200.16384 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 6.2.9200.16384 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 6.2.9200.16384 | Microsoft Fax Transport Provider
|
| | gameux.dll | 6.2.9200.16384 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gcdef.dll | 6.2.9200.16384 | Game Controllers Default Sheets
|
| | gdi32.dll | 6.2.9200.16604 | GDI Client DLL
|
| | gdiplus.dll | 6.2.9200.16502 | Microsoft GDI+
|
| | getuname.dll | 6.2.9200.16384 | Unicode name Dll for UCE
|
| | glcndfilter.dll | 6.2.9200.16451 | Windows Reader
|
| | glmf32.dll | 6.2.9200.16384 | OpenGL Metafiling DLL
|
| | glu32.dll | 6.2.9200.16384 | OpenGL Utility Library DLL
|
| | gpapi.dll | 6.2.9200.16384 | Group Policy Client API
|
| | gpedit.dll | 6.2.9200.16384 | GPEdit
|
| | gpprnext.dll | 6.2.9200.16384 | Group Policy Printer Extension
|
| | gptext.dll | 6.2.9200.16384 | GPTExt
|
| | hbaapi.dll | 6.2.9200.16384 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 6.2.9200.16384 | Action Center Providers
|
| | helppaneproxy.dll | 6.2.9200.16384 | Microsoft® Help Proxy
|
| | hgcpl.dll | 6.2.9200.16384 | HomeGroup Control Panel
|
| | hhsetup.dll | 6.2.9200.16384 | Microsoft® HTML Help
|
| | hid.dll | 6.2.9200.16384 | Hid User Library
|
| | hidserv.dll | 6.2.9200.16384 | HID Service
|
| | hlink.dll | 6.2.9200.16384 | Microsoft Office 2000 component
|
| | hnetcfg.dll | 6.2.9200.16384 | Home Networking Configuration Manager
|
| | hnetmon.dll | 6.2.9200.16384 | Home Networking Monitor DLL
|
| | httpapi.dll | 6.2.9200.16384 | HTTP Protocol Stack API
|
| | htui.dll | 6.2.9200.16384 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 6.2.9200.16384 | Network Policy Server
|
| | iasacct.dll | 6.2.9200.16384 | NPS Accounting Provider
|
| | iasads.dll | 6.2.9200.16384 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 6.2.9200.16384 | NPS Datastore server
|
| | iashlpr.dll | 6.2.9200.16384 | NPS Surrogate Component
|
| | iasmigplugin.dll | 6.2.9200.16384 | NPS Migration DLL
|
| | iasnap.dll | 6.2.9200.16384 | NPS NAP Provider
|
| | iaspolcy.dll | 6.2.9200.16384 | NPS Pipeline
|
| | iasrad.dll | 6.2.9200.16384 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 6.2.9200.16384 | NPS XML Datastore Access
|
| | iassam.dll | 6.2.9200.16384 | NPS NT SAM Provider
|
| | iassdo.dll | 6.2.9200.16384 | NPS SDO Component
|
| | iassvcs.dll | 6.2.9200.16384 | NPS Services Component
|
| | iccvid.dll | 1.10.0.12 | Cinepak® Codec
|
| | icm32.dll | 6.2.9200.16384 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 6.2.9200.16384 | ICMP DLL
|
| | icmui.dll | 6.2.9200.16384 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 6.2.9200.16384 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 6.2.9200.16384 | Internet Gateway Device properties
|
| | idctrls.dll | 6.2.9200.16384 | Identity Controls
|
| | idndl.dll | 6.2.9200.16384 | Downlevel DLL
|
| | idstore.dll | 6.2.9200.16384 | Identity Store
|
| | ieadvpack.dll | 10.0.9200.16384 | ADVPACK
|
| | ieapfltr.dll | 10.0.9200.16384 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.9200.16384 | IEAK branding
|
| | ieframe.dll | 10.0.9200.16598 | Internet Browser
|
| | iepeers.dll | 10.0.9200.16384 | Internet Explorer Peer Objects
|
| | iernonce.dll | 10.0.9200.16537 | Extended RunOnce processing with UI
|
| | iertutil.dll | 10.0.9200.16598 | Run time utility for Internet Explorer
|
| | iesetup.dll | 10.0.9200.16537 | IOD Version Map
|
| | iesysprep.dll | 10.0.9200.16537 | IE Sysprep Provider
|
| | ieui.dll | 10.0.9200.16384 | Internet Explorer UI Engine
|
| | ifmon.dll | 6.2.9200.16384 | IF Monitor DLL
|
| | ifsutil.dll | 6.2.9200.16384 | IFS Utility DLL
|
| | ifsutilx.dll | 6.2.9200.16384 | IFS Utility Extension DLL
|
| | ig4icd32.dll | 9.17.10.2884 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | ig7icd32.dll | 9.17.10.2963 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | igd10umd32.dll | 9.17.10.2963 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igdbcl32.dll | 9.17.10.2884 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdde32.dll | |
|
| | igdfcl32.dll | 8.1.0.2963 | OpenCL Driver for Intel(R) Graphics Technology
|
| | igdrcl32.dll | 9.17.10.2963 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdumd32.dll | 9.17.10.2963 | LDDM User Mode Driver for Intel(R) Graphics Technology
|
| | igfx11cmrt32.dll | 2.4.0.1019 | CM Runtime Dynamic Link Library (DX11)
|
| | igfxcmjit32.dll | 2.4.0.1019 | CM JIT Dynamic Link Library
|
| | igfxcmrt32.dll | 2.4.0.1019 | CM Runtime Dynamic Link Library
|
| | igfxdv32.dll | 8.15.10.2963 | igfxdev Module
|
| | igfxexps32.dll | 8.15.10.2963 | igfxext Module
|
| | iglhcp32.dll | 3.0.1.15 | iglhcp32 Dynamic Link Library
|
| | iglhsip32.dll | 3.0.0.12 | iglhsip32 Dynamic Link Library
|
| | imagehlp.dll | 6.2.9200.16384 | Windows NT Image Helper
|
| | imageres.dll | 6.2.9200.16384 | Windows Image Resource
|
| | imagesp1.dll | 6.2.9200.16384 | Windows SP1 Image Resource
|
| | imapi.dll | 6.2.9200.16384 | Image Mastering API
|
| | imapi2.dll | 6.2.9200.16384 | Image Mastering API v2
|
| | imapi2fs.dll | 6.2.9200.16384 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 10.0.9200.16384 | IE plugin image decoder support DLL
|
| | imm32.dll | 6.2.9200.16384 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 6.2.9200.16384 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 6.2.9200.16384 | Microsoft MIB-II subagent
|
| | inetres.dll | 6.2.9200.16384 | Microsoft Internet Messaging API Resources
|
| | inked.dll | 6.2.9200.16384 | Microsoft Tablet PC InkEdit Control
|
| | input.dll | 6.2.9200.16433 | InputSetting DLL
|
| | inputswitch.dll | 6.2.9200.16384 | Microsoft Windows Input Switcher
|
| | inseng.dll | 10.0.9200.16384 | Install engine
|
| | intel_opencl_icd32.dll | 1.2.1.0 | OpenCL Client DLL
|
| | intelopencl32.dll | 1.1.0.1003 | Intel(R) OpenCL(TM) Runtime
|
| | iologmsg.dll | 6.2.9200.16384 | IO Logging DLL
|
| | iphlpapi.dll | 6.2.9200.16420 | IP Helper API
|
| | iprop.dll | 6.2.9200.16384 | OLE PropertySet Implementation
|
| | iprtprio.dll | 6.2.9200.16384 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 6.2.9200.16384 | IP Router Manager
|
| | ipsecsnp.dll | 6.2.9200.16384 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 6.2.9200.16384 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 6.2.9200.16384 | IR32_32 WRAPPER DLL
|
| | ir32_32original.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_32original.dll | 4.51.16.3 | Intel Indeo® Video 4.5
|
| | ir41_qc.dll | 6.2.9200.16384 | IR41_QC WRAPPER DLL
|
| | ir41_qcoriginal.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 6.2.9200.16384 | IR41_QCX WRAPPER DLL
|
| | ir41_qcxoriginal.dll | 4.30.64.1 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 6.2.9200.16384 | IR50_32 WRAPPER DLL
|
| | ir50_32original.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 6.2.9200.16384 | IR50_QC WRAPPER DLL
|
| | ir50_qcoriginal.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 6.2.9200.16384 | IR50_QCX WRAPPER DLL
|
| | ir50_qcxoriginal.dll | 5.0.64.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 6.2.9200.16384 | Infrared Class Coinstaller
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 6.2.9200.16384 | iSCSI Discovery api
|
| | iscsied.dll | 6.2.9200.16384 | iSCSI Extension DLL
|
| | iscsium.dll | 6.2.9200.16384 | iSCSI Discovery api
|
| | iscsiwmi.dll | 6.2.9200.16384 | MS iSCSI Initiator WMI Provider
|
| | iscsiwmiv2.dll | 6.2.9200.16384 | WMI Provider for iSCSI
|
| | issacapi_bs-2.3.dll | |
|
| | issacapi_pe-2.3.dll | |
|
| | issacapi_se-2.3.dll | |
|
| | itircl.dll | 6.2.9200.16384 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 6.2.9200.16384 | Microsoft® InfoTech Storage System Library
|
| | iuseventlog.dll | |
|
| | iyuv_32.dll | 6.2.9200.16384 | Intel Indeo(R) Video YUV Codec
|
| | jscript.dll | 5.8.9200.16598 | Microsoft ® JScript
|
| | jscript9.dll | 10.0.9200.16598 | Microsoft ® JScript
|
| | jsproxy.dll | 10.0.9200.16537 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 6.2.9200.16384 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 6.2.9200.16384 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 6.2.9200.16384 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 6.2.9200.16384 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 6.2.9200.16384 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 6.2.9200.16384 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 6.2.9200.16384 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 6.2.9200.16384 | Albania Keyboard Layout
|
| | kbdarme.dll | 6.2.9200.16384 | Eastern Armenian Keyboard Layout
|
| | kbdarmph.dll | 6.2.9200.16384 | Armenian Phonetic Keyboard Layout
|
| | kbdarmty.dll | 6.2.9200.16384 | Armenian Typewriter Keyboard Layout
|
| | kbdarmw.dll | 6.2.9200.16384 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 6.2.9200.16384 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 6.2.9200.16384 | Azeri-Latin Keyboard Layout
|
| | kbdbash.dll | 6.2.9200.16384 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 6.2.9200.16384 | Belgian Keyboard Layout
|
| | kbdbene.dll | 6.2.9200.16384 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 6.2.9200.16384 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 6.2.9200.16384 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 6.2.9200.16384 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 6.2.9200.16384 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 6.2.9200.16384 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 6.2.9200.16384 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbulg.dll | 6.2.9200.16384 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 6.2.9200.16384 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 6.2.9200.16384 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcher.dll | 6.2.9200.16384 | Cherokee Nation Keyboard Layout
|
| | kbdcherp.dll | 6.2.9200.16384 | Cherokee Phonetic Keyboard Layout
|
| | kbdcr.dll | 6.2.9200.16384 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 6.2.9200.16384 | Czech Keyboard Layout
|
| | kbdcz1.dll | 6.2.9200.16384 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 6.2.9200.16384 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 6.2.9200.16384 | Danish Keyboard Layout
|
| | kbddiv1.dll | 6.2.9200.16384 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 6.2.9200.16384 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 6.2.9200.16384 | Dvorak US English Keyboard Layout
|
| | kbdes.dll | 6.2.9200.16384 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 6.2.9200.16384 | Estonia Keyboard Layout
|
| | kbdfa.dll | 6.2.9200.16384 | Persian Keyboard Layout
|
| | kbdfar.dll | 6.2.9200.16384 | Persian Standard Keyboard Layout
|
| | kbdfc.dll | 6.2.9200.16384 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 6.2.9200.16384 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 6.2.9200.16384 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 6.2.9200.16384 | Færoese Keyboard Layout
|
| | kbdfr.dll | 6.2.9200.16384 | French Keyboard Layout
|
| | kbdgae.dll | 6.2.9200.16384 | Scottish Gaelic (United Kingdom) Keyboard Layout
|
| | kbdgeo.dll | 6.2.9200.16384 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 6.2.9200.16384 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeome.dll | 6.2.9200.16384 | Georgian (MES) Keyboard Layout
|
| | kbdgeooa.dll | 6.2.9200.16384 | Georgian (Old Alphabets) Keyboard Layout
|
| | kbdgeoqw.dll | 6.2.9200.16384 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 6.2.9200.16384 | Greek_Latin Keyboard Layout
|
| | kbdgr.dll | 6.2.9200.16384 | German Keyboard Layout
|
| | kbdgr1.dll | 6.2.9200.16384 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 6.2.9200.16384 | Greenlandic Keyboard Layout
|
| | kbdhau.dll | 6.2.9200.16384 | Hausa Keyboard Layout
|
| | kbdhaw.dll | 6.2.9200.16384 | Hawaiian Keyboard Layout
|
| | kbdhe.dll | 6.2.9200.16384 | Greek Keyboard Layout
|
| | kbdhe220.dll | 6.2.9200.16384 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 6.2.9200.16384 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 6.2.9200.16384 | KBDHEB Keyboard Layout
|
| | kbdhebl3.dll | 6.2.9200.16433 | Hebrew Standard Keyboard Layout
|
| | kbdhela2.dll | 6.2.9200.16384 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 6.2.9200.16384 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 6.2.9200.16384 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 6.2.9200.16384 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 6.2.9200.16384 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 6.2.9200.16384 | Igbo Keyboard Layout
|
| | kbdic.dll | 6.2.9200.16384 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 6.2.9200.16384 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 6.2.9200.16384 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 6.2.9200.16384 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 6.2.9200.16384 | Bengali Keyboard Layout
|
| | kbdindev.dll | 6.2.9200.16384 | Devanagari Keyboard Layout
|
| | kbdinen.dll | 6.2.9200.16384 | English - India Keyboard Layout
|
| | kbdinguj.dll | 6.2.9200.16384 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 6.2.9200.16384 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 6.2.9200.16384 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 6.2.9200.16384 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 6.2.9200.16384 | Marathi Keyboard Layout
|
| | kbdinori.dll | 6.2.9200.16384 | Odia Keyboard Layout
|
| | kbdinpun.dll | 6.2.9200.16384 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 6.2.9200.16384 | Tamil Keyboard Layout
|
| | kbdintel.dll | 6.2.9200.16384 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 6.2.9200.16384 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 6.2.9200.16384 | Irish Keyboard Layout
|
| | kbdit.dll | 6.2.9200.16384 | Italian Keyboard Layout
|
| | kbdit142.dll | 6.2.9200.16384 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 6.2.9200.16384 | Inuktitut Latin Keyboard Layout
|
| | kbdjpn.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 6.2.9200.16384 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 6.2.9200.16384 | Cambodian Standard Keyboard Layout
|
| | kbdkni.dll | 6.2.9200.16384 | Khmer (NIDA) Keyboard Layout
|
| | kbdkor.dll | 6.2.9200.16384 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkurd.dll | 6.2.9200.16384 | Central Kurdish Keyboard Layout
|
| | kbdkyr.dll | 6.2.9200.16384 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 6.2.9200.16384 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 6.2.9200.16384 | Lao Standard Keyboard Layout
|
| | kbdlisub.dll | 6.2.9200.16384 | Lisu Basic Keyboard Layout
|
| | kbdlisus.dll | 6.2.9200.16384 | Lisu Standard Keyboard Layout
|
| | kbdlk41a.dll | 6.2.9200.16384 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 6.2.9200.16384 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 6.2.9200.16384 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 6.2.9200.16384 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 6.2.9200.16384 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 6.2.9200.16384 | Latvia-QWERTY Keyboard Layout
|
| | kbdmac.dll | 6.2.9200.16384 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 6.2.9200.16384 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 6.2.9200.16384 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 6.2.9200.16384 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 6.2.9200.16384 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 6.2.9200.16384 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 6.2.9200.16384 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdmyan.dll | 6.2.9200.16384 | Myanmar Keyboard Layout
|
| | kbdne.dll | 6.2.9200.16384 | Dutch Keyboard Layout
|
| | kbdnec.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 6.2.9200.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 6.2.9200.16384 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 6.2.9200.16384 | Nepali Keyboard Layout
|
| | kbdnko.dll | 6.2.9200.16384 | N'Ko Keyboard Layout
|
| | kbdno.dll | 6.2.9200.16384 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 6.2.9200.16384 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 6.2.9200.16384 | Sesotho sa Leboa Keyboard Layout
|
| | kbdntl.dll | 6.2.9200.16384 | New Tai Leu Keyboard Layout
|
| | kbdogham.dll | 6.2.9200.16384 | Ogham Keyboard Layout
|
| | kbdpash.dll | 6.2.9200.16384 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdphags.dll | 6.2.9200.16384 | Phags-pa Keyboard Layout
|
| | kbdpl.dll | 6.2.9200.16384 | Polish Keyboard Layout
|
| | kbdpl1.dll | 6.2.9200.16384 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 6.2.9200.16384 | Portuguese Keyboard Layout
|
| | kbdro.dll | 6.2.9200.16384 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 6.2.9200.16384 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 6.2.9200.16384 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 6.2.9200.16384 | Russian Keyboard Layout
|
| | kbdru1.dll | 6.2.9200.16384 | Russia(Typewriter) Keyboard Layout
|
| | kbdrum.dll | 6.2.9200.16384 | Russian - Mnemonic Keyboard Layout
|
| | kbdsf.dll | 6.2.9200.16384 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 6.2.9200.16384 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 6.2.9200.16384 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 6.2.9200.16384 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 6.2.9200.16384 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 6.2.9200.16384 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 6.2.9200.16384 | Sinhala Keyboard Layout
|
| | kbdsorex.dll | 6.2.9200.16384 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 6.2.9200.16384 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 6.2.9200.16384 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 6.2.9200.16384 | Spanish Keyboard Layout
|
| | kbdsw.dll | 6.2.9200.16384 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 6.2.9200.16384 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 6.2.9200.16384 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 6.2.9200.16384 | Syriac Phoenetic Keyboard Layout
|
| | kbdtaile.dll | 6.2.9200.16384 | Tai Le Keyboard Layout
|
| | kbdtajik.dll | 6.2.9200.16384 | Tajik Keyboard Layout
|
| | kbdtat.dll | 6.2.9200.16384 | Tatar_Cyrillic Keyboard Layout
|
| | kbdth0.dll | 6.2.9200.16384 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 6.2.9200.16384 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 6.2.9200.16384 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 6.2.9200.16384 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtifi.dll | 6.2.9200.16384 | Tifinagh (Basic) Keyboard Layout
|
| | kbdtifi2.dll | 6.2.9200.16384 | Tifinagh (Extended) Keyboard Layout
|
| | kbdtiprc.dll | 6.2.9200.16384 | Tibetan (PRC) Keyboard Layout
|
| | kbdtuf.dll | 6.2.9200.16384 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 6.2.9200.16384 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 6.2.9200.16384 | Turkmen Keyboard Layout
|
| | kbdughr.dll | 6.2.9200.16384 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 6.2.9200.16384 | Uyghur Keyboard Layout
|
| | kbduk.dll | 6.2.9200.16384 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 6.2.9200.16384 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 6.2.9200.16384 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 6.2.9200.16384 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 6.2.9200.16384 | Urdu Keyboard Layout
|
| | kbdus.dll | 6.2.9200.16384 | United States Keyboard Layout
|
| | kbdusa.dll | 6.2.9200.16384 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 6.2.9200.16384 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 6.2.9200.16384 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 6.2.9200.16384 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 6.2.9200.16384 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 6.2.9200.16384 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 6.2.9200.16384 | Wolof Keyboard Layout
|
| | kbdyak.dll | 6.2.9200.16384 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 6.2.9200.16384 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 6.2.9200.16384 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 6.2.9200.16384 | Serbian (Latin) Keyboard Layout
|
| | kerberos.dll | 6.2.9200.16578 | Kerberos Security Package
|
| | kernel32.dll | 6.2.9200.16604 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 6.2.9200.16451 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 6.2.9200.16384 | CNG Key Isolation Service
|
| | keymgr.dll | 6.2.9200.16384 | Stored User Names and Passwords
|
| | korwbrkr.dll | 6.2.9200.16384 | Korean Word Breaker
|
| | ksuser.dll | 6.2.9200.16384 | User CSA Library
|
| | ktmw32.dll | 6.2.9200.16384 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 6.2.9200.16384 | Policy Storage dll
|
| | l2nacp.dll | 6.2.9200.16384 | Windows Onex Credential Provider
|
| | l2sechc.dll | 6.2.9200.16384 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.9200.16384 | Windows Media Logagent Proxy
|
| | licmgr10.dll | 10.0.9200.16384 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 6.2.9200.16384 | Windows Volume Tracking
|
| | loadperf.dll | 6.2.9200.16384 | Load & Unload Performance Counters
|
| | localsec.dll | 6.2.9200.16384 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 6.2.9200.16384 | Microsoft Windows Location API
|
| | loghours.dll | 6.2.9200.16384 | Schedule Dialog
|
| | logoncli.dll | 6.2.9200.16384 | Net Logon Client DLL
|
| | lpk.dll | 6.2.9200.16453 | Language Pack
|
| | lsmproxy.dll | 6.2.9200.16384 | LSM interfaces proxy Dll
|
| | luainstall.dll | 6.2.9200.16384 | Lua manifest install
|
| | lz32.dll | 6.2.9200.16384 | LZ Expand/Compress API DLL
|
| | macxmlproto.dll | 1.2.2005.128 | ????? ???? ?????
|
| | madrm.dll | 3.0.2004.1011 | MaDRM DLL
|
| | magnification.dll | 6.2.9200.16384 | Microsoft Magnification API
|
| | majguilib.dll | 1.0.2004.301 | MaJGUILib DLL
|
| | mamacextract.dll | 1.0.2009.930 | ???? MAC ?? ?? DLL
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | maxmlproto.dll | 1.0.2004.602 | MaXMLProto DLL
|
| | mbaeapi.dll | 6.2.9200.16384 | Mobile Broadband Account Experience API
|
| | mbaeapipublic.dll | 6.2.9200.16384 | Mobile Broadband Account API
|
| | mbsmsapi.dll | 6.2.9200.16518 | Microsoft Windows Mobile Broadband SMS API
|
| | mbussdapi.dll | 6.2.9200.16384 | Microsoft Windows Mobile Broadband USSD API
|
| | mcewmdrmndbootstrap.dll | 1.3.2310.10 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 6.2.9200.16384 | Video For Windows MCI driver
|
| | mcicda.dll | 6.2.9200.16384 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 6.6.9200.16384 | DirectShow MCI Driver
|
| | mciseq.dll | 6.2.9200.16384 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 6.2.9200.16384 | MCI driver for waveform audio
|
| | mdminst.dll | 6.2.9200.16384 | Modem Class Installer
|
| | mf.dll | 12.0.9200.16384 | Media Foundation DLL
|
| | mf3216.dll | 6.2.9200.16384 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 6.2.9200.16384 | Media Foundation AAC Encoder
|
| | mfasfsrcsnk.dll | 12.0.9200.16437 | Media Foundation ASF Source and Sink DLL
|
| | mfc100.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc100chs.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100cht.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100deu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100enu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100esn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100fra.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100ita.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100jpn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100kor.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100rus.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100u.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc140.dll | 14.0.23506.0 | MFCDLL Shared Library - Retail Version
|
| | mfc140u.dll | 14.0.23506.0 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfcaptureengine.dll | 12.0.9200.16451 | Media Foundation CaptureEngine DLL
|
| | mfcm100.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm140.dll | 14.0.23506.0 | MFC Managed Library - Retail Version
|
| | mfcm140u.dll | 14.0.23506.0 | MFC Managed Library - Retail Version
|
| | mfcore.dll | 12.0.9200.16451 | Media Foundation Core DLL
|
| | mfcsubs.dll | 2001.12.10130.16384 | COM+
|
| | mfds.dll | 12.0.9200.16384 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 6.2.9200.16384 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.9200.16384 | Media Foundation Error DLL
|
| | mfh264enc.dll | 6.2.9200.16420 | Media Foundation H264 Encoder
|
| | mfmediaengine.dll | 6.2.9200.16578 | Media Foundation Media Engine DLL
|
| | mfmjpegdec.dll | 6.2.9200.16384 | Media Foundation MJPEG Decoder
|
| | mfmp4srcsnk.dll | 12.0.9200.16604 | Media Foundation MPEG4 Source and Sink DLL
|
| | mfmpeg2srcsnk.dll | 12.0.9200.16437 | Media Foundation MPEG2 Source and Sink DLL
|
| | mfnetcore.dll | 12.0.9200.16437 | Media Foundation Net Core DLL
|
| | mfnetsrc.dll | 12.0.9200.16437 | Media Foundation Net Source DLL
|
| | mfplat.dll | 12.0.9200.16433 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.9200.16420 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.9200.16384 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.9200.16578 | Media Foundation ReadWrite DLL
|
| | mfsrcsnk.dll | 12.0.9200.16420 | Media Foundation Source and Sink DLL
|
| | mfsvr.dll | 6.2.9200.16420 | Media Foundation Simple Video Renderer DLL
|
| | mftranscode.dll | 12.0.9200.16384 | Media Foundation Transcode DLL
|
| | mfvdsp.dll | 6.2.9200.16384 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 6.2.9200.16384 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 6.2.9200.16384 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | mi.dll | 6.2.9200.16384 | Management Infrastructure
|
| | midimap.dll | 6.2.9200.16384 | Microsoft MIDI Mapper
|
| | migisol.dll | 6.2.9200.16384 | Migration System Isolation Layer
|
| | miguiresource.dll | 6.2.9200.16384 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.9200.16384 | MIME Filter
|
| | mirrordrvcompat.dll | 6.2.9200.16384 | Mirror Driver Compatibility Helper
|
| | miutils.dll | 6.2.9200.16384 | Management Infrastructure
|
| | mk_lyric.dll | 1.0.1124.1 | MK_Lyric
|
| | mlang.dll | 6.2.9200.16384 | Multi Language Support DLL
|
| | mmcbase.dll | 6.2.9200.16384 | MMC Base DLL
|
| | mmci.dll | 6.2.9200.16384 | Media class installer
|
| | mmcico.dll | 6.2.9200.16384 | Media class co-installer
|
| | mmcndmgr.dll | 6.2.9200.16384 | MMC Node Manager DLL
|
| | mmcshext.dll | 6.2.9200.16384 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 6.2.9200.16420 | MMDevice API
|
| | mmres.dll | 6.2.9200.16384 | General Audio Resources
|
| | modemui.dll | 6.2.9200.16384 | Windows Modem Properties
|
| | moricons.dll | 6.2.9200.16384 | Windows NT Setup Icon Resources Library
|
| | mp3dmod.dll | 6.2.9200.16384 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 6.2.9200.16384 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 6.2.9200.16496 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 6.2.9200.16384 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 6.2.9200.16384 | Multiple Provider Router DLL
|
| | mprapi.dll | 6.2.9200.16384 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 6.2.9200.16384 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 6.2.9200.16384 | Dynamic Interface Manager
|
| | mprext.dll | 6.2.9200.16384 | Multiple Provider Router Extension DLL
|
| | mprmsg.dll | 6.2.9200.16384 | Multi-Protocol Router Service Messages DLL
|
| | mrmcorer.dll | 6.2.9200.16384 | Microsoft Windows MRM
|
| | mrmindexer.dll | 6.2.9200.16384 | Microsoft Windows MRM
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 6.2.9200.16384 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 6.2.9200.16384 | Microsoft ACM Audio Filter
|
| | msadce.dll | 6.2.9200.16384 | OLE DB Cursor Engine
|
| | msadcer.dll | 6.2.9200.16384 | OLE DB Cursor Engine Resources
|
| | msadco.dll | 6.2.9200.16384 | Remote Data Services Data Control
|
| | msadcor.dll | 6.2.9200.16384 | Remote Data Services Data Control Resources
|
| | msadds.dll | 6.2.9200.16384 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 6.2.9200.16384 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 6.2.9200.16384 | ActiveX Data Objects Resources
|
| | msado15.dll | 6.2.9200.16384 | ActiveX Data Objects
|
| | msadomd.dll | 6.2.9200.16384 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 6.2.9200.16384 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 6.2.9200.16384 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 6.2.9200.16384 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 6.2.9200.16384 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msasn1.dll | 6.2.9200.16384 | ASN.1 Runtime APIs
|
| | msauddecmft.dll | 6.2.9200.16578 | Media Foundation Audio Decoders
|
| | msaudite.dll | 6.2.9200.16384 | Security Audit Events DLL
|
| | mscandui.dll | 6.2.9200.16384 | MSCANDUI Server DLL
|
| | mscat32.dll | 6.2.9200.16384 | MSCAT32 Forwarder DLL
|
| | msclib.dll | 1.0.0.8 | MSCLib DLL
|
| | msclmd.dll | 6.2.9200.16384 | Microsoft Class Mini-driver
|
| | mscms.dll | 6.2.9200.16384 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 4.0.41209.0 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 2.0.50727.6387 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.6387 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 6.2.9200.16384 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 6.2.9200.16384 | ODBC Code Page Translator
|
| | msctf.dll | 6.2.9200.16496 | MSCTF Server DLL
|
| | msctfmonitor.dll | 6.2.9200.16384 | MsCtfMonitor DLL
|
| | msctfp.dll | 6.2.9200.16384 | MSCTFP Server DLL
|
| | msctfui.dll | 6.2.9200.16384 | MSCTFUI Server DLL
|
| | msdadc.dll | 6.2.9200.16384 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 6.2.9200.16384 | Built-In Diagnostics
|
| | msdaenum.dll | 6.2.9200.16384 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 6.2.9200.16384 | OLE DB Error Collection Stub
|
| | msdaora.dll | 6.2.9200.16384 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 6.2.9200.16384 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 6.2.9200.16384 | OLE DB Simple Provider
|
| | msdaprsr.dll | 6.2.9200.16384 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 6.2.9200.16384 | OLE DB Persistence Services
|
| | msdaps.dll | 6.2.9200.16384 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 6.2.9200.16384 | OLE DB Remote Provider
|
| | msdaremr.dll | 6.2.9200.16384 | OLE DB Remote Provider Resources
|
| | msdart.dll | 6.2.9200.16384 | OLE DB Runtime Routines
|
| | msdasc.dll | 6.2.9200.16384 | OLE DB Service Components Stub
|
| | msdasql.dll | 6.2.9200.16384 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 6.2.9200.16384 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 6.2.9200.16384 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 6.2.9200.16384 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 6.2.9200.16384 | OLE DB RootBinder Stub
|
| | msdelta.dll | 6.2.9200.16384 | Microsoft Patch Engine
|
| | msdfmap.dll | 6.2.9200.16384 | Data Factory Handler
|
| | msdmo.dll | 6.6.9200.16384 | DMO Runtime
|
| | msdrm.dll | 6.2.9200.16384 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 10.0.9200.16598 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 10.0.9200.16384 | Microsoft Feeds Background Sync
|
| | msflib.dll | 1.0.0.7 | MSFLib DLL
|
| | msftedit.dll | 6.2.9200.16384 | Rich Text Edit Control, v7.5
|
| | mshtml.dll | 10.0.9200.16612 | Microsoft (R) HTML Viewer
|
| | mshtmled.dll | 10.0.9200.16384 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 10.0.9200.16384 | Microsoft® HTML Editing Component's Resource DLL
|
| | msi.dll | 5.0.9200.16384 | Windows Installer
|
| | msidcrl40.dll | 6.2.9200.16384 | Microsoft® Account Dynamic Link Library
|
| | msident.dll | 6.2.9200.16384 | Microsoft Identity Manager
|
| | msidle.dll | 6.2.9200.16384 | User Idle Monitor
|
| | msidntld.dll | 6.2.9200.16384 | Microsoft Identity Manager
|
| | msieftp.dll | 6.2.9200.16384 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.9200.16384 | Windows® installer
|
| | msiltcfg.dll | 5.0.9200.16384 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 6.2.9200.16384 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.9200.16384 | Windows® Installer International Messages
|
| | msimtf.dll | 6.2.9200.16384 | Active IMM Server DLL
|
| | msisip.dll | 5.0.9200.16384 | MSI Signature SIP Provider
|
| | msiwer.dll | 5.0.9200.16384 | MSI Windows Error Reporting
|
| | msjet40.dll | 4.0.9765.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9765.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 6.2.9200.16384 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | mskeyprotcli.dll | 6.2.9200.16384 | Windows Client Key Protection Provider
|
| | mskeyprotect.dll | 6.2.9200.16384 | Microsoft Key Protection Provider
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | mslur71.dll | 7.10.0.0 | User-Generated Microsoft (R) C/C++ Runtime Library
|
| | msmapi32.dll | 15.0.4420.1017 | Extended MAPI 1.0 for Windows NT
|
| | msmpeg2adec.dll | 12.0.8506.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 12.0.9200.16384 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 12.0.9200.16429 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.9200.16384 | DRM ActiveX Network Object
|
| | msobjs.dll | 6.2.9200.16384 | System object audit names
|
| | msoeacct.dll | 6.2.9200.16384 | Microsoft Internet Account Manager
|
| | msoert2.dll | 6.2.9200.16384 | Microsoft Windows Mail RT Lib
|
| | msorc32r.dll | 6.2.9200.16384 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 6.2.9200.16384 | ODBC Driver for Oracle
|
| | mspatcha.dll | 6.2.9200.16384 | Microsoft File Patch Application API
|
| | mspatchc.dll | 6.2.9200.16384 | Microsoft Patch Creation Engine
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msports.dll | 6.2.9200.16384 | Ports Class Installer
|
| | msrating.dll | 10.0.9200.16384 | Internet Ratings and Local User Management DLL
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 6.2.9200.16384 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 6.2.9200.16384 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 6.2.9200.16384 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.9200.16433 | PKM Perfmon Counter DLL
|
| | msscp.dll | 11.0.9200.16384 | Windows Media Secure Content Provider
|
| | mssha.dll | 6.2.9200.16384 | Windows Security Health Agent
|
| | msshavmsg.dll | 6.2.9200.16384 | Windows Security Health Agent Validator Message
|
| | msshooks.dll | 7.0.9200.16578 | Microsoft Search Hooks
|
| | mssign32.dll | 6.2.9200.16384 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 6.2.9200.16384 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.9200.16433 | mssitlb
|
| | msspellcheckingfacility.dll | 6.2.9200.16420 | Microsoft Spell Checking Facility
|
| | mssph.dll | 7.0.9200.16578 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.9200.16578 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.9200.16578 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.9200.16578 | Microsoft Embedded Search
|
| | mssvp.dll | 7.0.9200.16578 | MSSearch Vista Platform
|
| | mstask.dll | 6.2.9200.16384 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 6.2.9200.16518 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 6.2.9200.16384 | MSUTB Server DLL
|
| | msv1_0.dll | 6.2.9200.16384 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.9200.16384 | Windows NT IOStreams DLL
|
| | msvcp100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcp110.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcp110_clr0400.dll | 11.0.50709.17929 | Microsoft® C Runtime Library
|
| | msvcp110d.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcp140.dll | 14.0.23506.0 | Microsoft® C Runtime Library
|
| | msvcp60.dll | 7.0.9200.16384 | Windows NT C++ Runtime Library DLL
|
| | msvcp71.dll | 7.10.3077.0 | Microsoft® C++ Runtime Library
|
| | msvcr100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 11.0.50709.18010 | Microsoft® .NET Framework
|
| | msvcr110.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcr110_clr0400.dll | 11.0.50709.17929 | Microsoft® C Runtime Library
|
| | msvcr110d.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcr71.dll | 7.10.3052.4 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.9200.16384 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 6.2.9200.16384 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 6.2.9200.16384 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 6.2.9200.16384 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.9200.16384 | ActiveX control for streaming video
|
| | msvideodsp.dll | 6.2.9200.16384 | Video Stabilization MFT
|
| | msvproc.dll | 12.0.9200.16420 | Media Foundation Video Processor
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.9200.16384 | Windows Media Device Manager Core
|
| | mswsock.dll | 6.2.9200.16433 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9765.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 6.2.9200.16384 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.9200.16447 | MSXML 3.0
|
| | msxml3a.dll | 8.10.8308.0 | XML Resources
|
| | msxml3r.dll | 8.110.9200.16447 | XML Resources
|
| | msxml6.dll | 6.30.9200.16447 | MSXML 6.0
|
| | msxml6r.dll | 6.30.9200.16447 | XML Resources
|
| | msyuv.dll | 6.2.9200.16384 | Microsoft UYVY Video Decompressor
|
| | mttelechip.dll | 1.9.4.2 | USB Dynamic Link Library for TCC730
|
| | mtxclu.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.10130.16384 | COM+
|
| | mtxex.dll | 2001.12.10130.16384 | COM+
|
| | mtxlegih.dll | 2001.12.10130.16384 | COM+
|
| | mtxoci.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | mtxsyncicon.dll | 1.0.0.1 | MTXSYNCICON Module
|
| | muifontsetup.dll | 6.2.9200.16604 | MUI Callback for font registry settings
|
| | muzaf1.dll | 1.0.0.60410 | AOD Sourcer Filter
|
| | muzapp.dll | 1.3.9.303 | MUZAoDAppCtrl Module
|
| | muzwmts.dll | 1.0.0.60208 | P3WMTSplitter Filter
|
| | mycomput.dll | 6.2.9200.16384 | Computer Management
|
| | mydocs.dll | 6.2.9200.16384 | My Documents Folder UI
|
| | napcrypt.dll | 6.2.9200.16384 | NAP Cryptographic API helper
|
| | napdsnap.dll | 6.2.9200.16384 | NAP GPEdit Extension
|
| | naphlpr.dll | 6.2.9200.16384 | NAP client config API helper
|
| | napinsp.dll | 6.2.9200.16384 | E-mail Naming Shim Provider
|
| | napipsec.dll | 6.2.9200.16384 | NAP IPSec Enforcement Client
|
| | napmontr.dll | 6.2.9200.16384 | NAP Netsh Helper
|
| | naturallanguage6.dll | 6.2.9200.16384 | Natural Language Development Platform 6
|
| | ncaapi.dll | 6.2.9200.16384 | Microsoft Network Connectivity Assistant API
|
| | ncdprop.dll | 6.2.9200.16384 | Advanced network device properties
|
| | nci.dll | 6.2.9200.16384 | CoInstaller: NET
|
| | ncobjapi.dll | 6.2.9200.16384 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 6.2.9200.16384 | Windows NCrypt Router
|
| | ncryptprov.dll | 6.2.9200.16384 | Microsoft KSP
|
| | ncryptsslp.dll | 6.2.9200.16464 | Microsoft SChannel Provider
|
| | nddeapi.dll | 6.2.9200.16384 | Network DDE Share Management APIs
|
| | ndfapi.dll | 6.2.9200.16384 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 6.2.9200.16384 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 6.2.9200.16384 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 6.2.9200.16384 | NdisCap Notify Object
|
| | ndishc.dll | 6.2.9200.16384 | NDIS Helper Classes
|
| | ndproxystub.dll | 6.2.9200.16384 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 6.2.9200.16384 | NegoExtender Security Package
|
| | netapi32.dll | 6.2.9200.16384 | Net Win32 API DLL
|
| | netbios.dll | 6.2.9200.16384 | NetBIOS Interface Library
|
| | netcenter.dll | 6.2.9200.16384 | Network Center control panel
|
| | netcfgx.dll | 6.2.9200.16384 | Network Configuration Objects
|
| | netcorehc.dll | 6.2.9200.16384 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 6.2.9200.16384 | Network Diagnostic Framework
|
| | netevent.dll | 6.2.9200.16384 | Net Event Handler
|
| | netfxperf.dll | 4.0.41209.0 | Extensible Performance Counter Shim
|
| | neth.dll | 6.2.9200.16384 | Net Help Messages DLL
|
| | netid.dll | 6.2.9200.16384 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 6.2.9200.16384 | Netio Helper DLL
|
| | netjoin.dll | 6.2.9200.16384 | Domain Join DLL
|
| | netlogon.dll | 6.2.9200.16384 | Net Logon Services DLL
|
| | netmsg.dll | 6.2.9200.16384 | Net Messages DLL
|
| | netplwiz.dll | 6.2.9200.16604 | Map Network Drives/Network Places Wizard
|
| | netprofm.dll | 6.2.9200.16604 | Network List Manager
|
| | netprovisionsp.dll | 6.2.9200.16384 | Provisioning Service Provider DLL
|
| | netshell.dll | 6.2.9200.16384 | Network Connections Shell
|
| | netutils.dll | 6.2.9200.16384 | Net Win32 API Helpers DLL
|
| | networkexplorer.dll | 6.2.9200.16384 | Network Explorer
|
| | networkitemfactory.dll | 6.2.9200.16384 | NetworkItem Factory
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | ninput.dll | 6.2.9200.16384 | Microsoft Pen and Touch Input Component
|
| | nlaapi.dll | 6.2.9200.16518 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.9200.16384 | HTML filter
|
| | nlmgp.dll | 6.2.9200.16384 | Network List Manager Snapin
|
| | nlmproxy.dll | 6.2.9200.16518 | Network List Manager Public Proxy
|
| | nlmsprep.dll | 6.2.9200.16518 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 6.2.9200.16384 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0001.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0002.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0003.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0007.dll | 6.2.9200.16384 | Microsoft German Natural Language Server Data and Code
|
| | nlsdata0009.dll | 6.2.9200.16384 | Microsoft English Natural Language Server Data and Code
|
| | nlsdata000a.dll | 6.2.9200.16384 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlsdata000c.dll | 6.2.9200.16384 | Microsoft French Natural Language Server Data and Code
|
| | nlsdata000d.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata000f.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0010.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0011.dll | 6.2.9200.16384 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlsdata0013.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0018.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0019.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001b.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001d.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0020.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0021.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0022.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0024.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0026.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0027.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata002a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0039.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata003e.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0045.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0046.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0047.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0049.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004b.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004c.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004e.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0414.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0416.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0816.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata081a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0c1a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdl.dll | 6.2.9200.16384 | Nls Downlevel DLL
|
| | nlslexicons0001.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0002.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0003.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0007.dll | 6.2.9200.16384 | Microsoft German Natural Language Server Data and Code
|
| | nlslexicons0009.dll | 6.2.9200.16384 | Microsoft English Natural Language Server Data and Code
|
| | nlslexicons000a.dll | 6.2.9200.16384 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlslexicons000c.dll | 6.2.9200.16384 | Microsoft French Natural Language Server Data and Code
|
| | nlslexicons000d.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons000f.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0010.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0011.dll | 6.2.9200.16384 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlslexicons0013.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0018.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0019.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001b.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001d.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0020.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0021.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0022.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0024.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0026.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0027.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons002a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0039.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons003e.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0045.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0046.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0047.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0049.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004b.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004c.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004e.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0414.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0416.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0816.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons081a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0c1a.dll | 6.2.9200.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsmodels0011.dll | 6.2.9200.16384 | Microsoft Japanese Natural Language Server Data and Code
|
| | normaliz.dll | 6.2.9200.16384 | Unicode Normalization DLL
|
| | npmproxy.dll | 6.2.9200.16604 | Network List Manager Proxy
|
| | nshhttp.dll | 6.2.9200.16384 | HTTP netsh DLL
|
| | nshipsec.dll | 6.2.9200.16384 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 6.2.9200.16465 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 6.2.9200.16384 | NSI User-mode interface DLL
|
| | ntasn1.dll | 6.2.9200.16384 | Microsoft ASN.1 API
|
| | ntdll.dll | 6.2.9200.16578 | NT Layer DLL
|
| | ntdsapi.dll | 6.2.9200.16384 | Active Directory Domain Services API
|
| | ntlanman.dll | 6.2.9200.16384 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 6.2.9200.16384 | Network object shell UI
|
| | ntmarta.dll | 6.2.9200.16384 | Windows NT MARTA provider
|
| | ntprint.dll | 6.2.9200.16384 | Spooler Setup DLL
|
| | ntshrui.dll | 6.2.9200.16384 | Shell extensions for sharing
|
| | ntvdm64.dll | 6.2.9200.16384 | 16-bit Emulation on NT64
|
| | nvd3dum.dll | 9.18.13.286 | NVIDIA WDDM D3D Driver, Version 302.86
|
| | nvwgf2um.dll | 9.18.13.286 | NVIDIA D3D10 Driver, Version 302.86
|
| | objsel.dll | 6.2.9200.16384 | Object Picker Dialog
|
| | occache.dll | 10.0.9200.16384 | Object Control Viewer
|
| | ocsetapi.dll | 6.2.9200.16384 | Windows Optional Component Setup API
|
| | odbc32.dll | 6.2.9200.16384 | ODBC Driver Manager
|
| | odbcbcp.dll | 6.2.9200.16384 | BCP for ODBC
|
| | odbcconf.dll | 6.2.9200.16384 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 6.2.9200.16384 | ODBC Installer
|
| | odbccr32.dll | 6.2.9200.16384 | ODBC Cursor Library
|
| | odbccu32.dll | 6.2.9200.16384 | ODBC Cursor Library
|
| | odbcint.dll | 6.2.9200.16384 | ODBC Resources
|
| | odbcji32.dll | 6.2.9200.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 6.2.9200.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 6.2.9200.16384 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 6.2.9200.16384 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 6.2.9200.16384 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 6.2.9200.16384 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 6.2.9200.16384 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 6.2.9200.16384 | ODBC (3.0) driver for text files
|
| | oemlicense.dll | |
|
| | offfilt.dll | 2008.0.9200.16384 | OFFICE Filter
|
| | ogldrv.dll | 6.2.9200.16384 | MSOGL
|
| | ole2.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | ole2disp.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole2nls.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole32.dll | 6.2.9200.16451 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.2.9200.16384 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.2.9200.16384 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.2.9200.16384 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 6.2.9200.16384 |
|
| | olecli32.dll | 6.2.9200.16384 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 6.2.9200.16384 | OLE DB Core Services
|
| | oledb32r.dll | 6.2.9200.16384 | OLE DB Core Services Resources
|
| | oledlg.dll | 6.2.9200.16384 | OLE User Interface Support
|
| | oleprn.dll | 6.2.9200.16384 | Oleprn DLL
|
| | olepro32.dll | 6.2.9200.16384 |
|
| | olesvr32.dll | 6.2.9200.16384 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 6.2.9200.16384 | Microsoft OLE for Windows
|
| | onex.dll | 6.2.9200.16384 | IEEE 802.1X supplicant library
|
| | onexui.dll | 6.2.9200.16384 | IEEE 802.1X supplicant UI library
|
| | oobefldr.dll | 6.2.9200.16384 | Getting Started
|
| | opcservices.dll | 6.2.9200.16384 | Native Code OPC Services Library
|
| | opencl.dll | 1.2.1.0 | OpenCL Client DLL
|
| | opengl32.dll | 6.2.9200.16384 | OpenGL Client DLL
|
| | osbaseln.dll | 6.2.9200.16384 | Service Reporting API
|
| | osksupport.dll | 6.2.9200.16384 | Microsoft On-Screen Keyboard Support Utilities
|
| | osuninst.dll | 6.2.9200.16384 | Uninstall Interface
|
| | p2p.dll | 6.2.9200.16384 | Peer-to-Peer Grouping
|
| | p2pgraph.dll | 6.2.9200.16384 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 6.2.9200.16384 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 6.2.9200.16384 | Object Packager2
|
| | packagestateroaming.dll | 6.2.9200.16420 | Package State Roaming
|
| | panmap.dll | 6.2.9200.16384 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 6.2.9200.16384 | Auto Enrollment DLL
|
| | pcacli.dll | 6.2.9200.16384 | Program Compatibility Assistant Client Module
|
| | pcaui.dll | 6.2.9200.16384 | Program Compatibility Assistant User Interface Module
|
| | pcpksp.dll | 6.2.9200.16433 | Microsoft Platform Key Storage Provider for Platform Crypto Provider
|
| | pcptpm12.dll | 6.2.9200.16384 | Microsoft Platform Crypto Provider for Trusted Platform Module 1.2
|
| | pcwum.dll | 6.2.9200.16384 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 6.2.9200.16384 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 6.2.9200.16384 | PDH UI
|
| | perfcentercpl.dll | 6.2.9200.16384 | Performance Center
|
| | perfctrs.dll | 6.2.9200.16420 | Performance Counters
|
| | perfdisk.dll | 6.2.9200.16420 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 6.2.9200.16420 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 6.2.9200.16420 | Windows System Performance Objects DLL
|
| | perfproc.dll | 6.2.9200.16420 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 6.2.9200.16384 | Windows Remote Desktop Services Performance Objects
|
| | photometadatahandler.dll | 6.2.9200.16384 | Photo Metadata Handler
|
| | photowiz.dll | 6.2.9200.16384 | Photo Printing Wizard
|
| | pid.dll | 6.2.9200.16384 | Microsoft PID
|
| | pidgenx.dll | 6.2.9200.16384 | Pid Generation
|
| | pifmgr.dll | 6.2.9200.16384 | Windows NT PIF Manager Icon Resources Library
|
| | pku2u.dll | 6.2.9200.16384 | Pku2u Security Package
|
| | pla.dll | 6.2.9200.16384 | Performance Logs & Alerts
|
| | playlistfolder.dll | 6.2.9200.16384 | Playlist Folder
|
| | playsndsrv.dll | 6.2.9200.16384 | PlaySound Service
|
| | playtomanager.dll | 6.2.9200.16384 | Microsoft Windows PlayTo Manager
|
| | pngfilt.dll | 10.0.9200.16384 | IE PNG plugin image decoder
|
| | pnrpnsp.dll | 6.2.9200.16384 | PNRP Name Space Provider
|
| | polstore.dll | 6.2.9200.16384 | Policy Storage dll
|
| | portabledeviceapi.dll | 6.2.9200.16384 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 6.2.9200.16384 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 6.2.9200.16384 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 6.2.9200.16384 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 6.2.9200.16384 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 6.2.9200.16384 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 6.2.9200.16384 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 6.2.9200.16384 | Windows Portable Device WMDRM Component
|
| | pots.dll | 6.2.9200.16384 | Power Troubleshooter
|
| | powercpl.dll | 6.2.9200.16384 | Power Options Control Panel
|
| | powrprof.dll | 6.2.9200.16384 | Power Profile Helper DLL
|
| | presentationcffrasterizernative_v0300.dll | 3.0.6920.6387 | WinFX OpenType/CFF Rasterizer
|
| | presentationhostproxy.dll | 4.0.41209.0 | Windows Presentation Foundation Host Proxy
|
| | presentationnative_v0300.dll | 3.0.6920.6387 | PresentationNative_v0300.dll
|
| | prflbmsg.dll | 6.2.9200.16384 | Perflib Event Messages
|
| | printconfig.dll | 0.3.9200.16518 | PrintConfig User Interface
|
| | printdialogs.dll | 6.2.9200.16384 | Microsoft® Windows® Operating System
|
| | printui.dll | 6.2.9200.16384 | Printer Settings User Interface
|
| | prncache.dll | 6.2.9200.16384 | Print UI Cache
|
| | prnfldr.dll | 6.2.9200.16384 | prnfldr dll
|
| | prnntfy.dll | 6.2.9200.16384 | prnntfy DLL
|
| | prntvpt.dll | 6.2.9200.16384 | Print Ticket Services Module
|
| | profapi.dll | 6.2.9200.16384 | User Profile Basic API
|
| | profext.dll | 6.2.9200.16384 | profext
|
| | propsys.dll | 7.0.9200.16420 | Microsoft Property System
|
| | provcore.dll | 6.2.9200.16420 | Microsoft Wireless Provisioning Core
|
| | provsvc.dll | 6.2.9200.16384 | Windows HomeGroup
|
| | provthrd.dll | 6.2.9200.16384 | WMI Provider Thread & Log Library
|
| | proximitycommon.dll | 6.2.9200.16384 | Proximity Common Implementation
|
| | prvdmofcomp.dll | 6.2.9200.16384 | WMI
|
| | psapi.dll | 6.2.9200.16384 | Process Status Helper
|
| | pshed.dll | 6.2.9200.16384 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 6.6.9200.16384 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | psmodulediscoveryprovider.dll | 6.2.9200.16384 | WMI
|
| | pstorec.dll | 6.2.9200.16384 | Deprecated Protected Storage COM interfaces
|
| | puiapi.dll | 6.2.9200.16384 | puiapi DLL
|
| | puiobj.dll | 6.2.9200.16384 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 6.2.9200.16384 | pwrshplugin.dll
|
| | qagent.dll | 6.2.9200.16384 | Quarantine Agent Proxy
|
| | qasf.dll | 12.0.9200.16384 | DirectShow ASF Support
|
| | qcap.dll | 6.6.9200.16384 | DirectShow Runtime.
|
| | qcliprov.dll | 6.2.9200.16384 | Quarantine Client WMI Provider
|
| | qdv.dll | 6.6.9200.16384 | DirectShow Runtime.
|
| | qdvd.dll | 6.6.9200.16384 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 6.6.9200.16384 | DirectShow Editing.
|
| | qedwipes.dll | 6.6.9200.16384 | DirectShow Editing SMPTE Wipes
|
| | qmgrprxy.dll | 7.6.9200.16384 | Background Intelligent Transfer Service Proxy
|
| | qshvhost.dll | 6.2.9200.16384 | Quarantine SHV Host
|
| | qsvrmgmt.dll | 6.2.9200.16384 | Quarantine Server Management
|
| | quartz.dll | 6.6.9200.16384 | DirectShow Runtime.
|
| | query.dll | 6.2.9200.16384 | Content Index Utility DLL
|
| | qutil.dll | 6.2.9200.16384 | Quarantine Utilities
|
| | qwave.dll | 6.2.9200.16384 | Windows NT
|
| | racengn.dll | 6.2.9200.16420 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 6.2.9200.16384 | Remote Assistance Contact List
|
| | radardt.dll | 6.2.9200.16384 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 6.2.9200.16384 | Microsoft Windows Resource Exhaustion Resolver
|
| | rasadhlp.dll | 6.2.9200.16384 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 6.2.9200.16384 | Remote Access API
|
| | rascfg.dll | 6.2.9200.16420 | RAS Configuration Objects
|
| | raschap.dll | 6.2.9200.16384 | Remote Access PPP CHAP
|
| | rasctrs.dll | 6.2.9200.16384 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 6.2.9200.16420 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 6.2.9200.16384 | Remote Access Common Dialog API
|
| | rasgcw.dll | 6.2.9200.16384 | RAS Wizard Pages
|
| | rasman.dll | 6.2.9200.16384 | Remote Access Connection Manager
|
| | rasmontr.dll | 6.2.9200.16384 | RAS Monitor DLL
|
| | rasmxs.dll | 6.2.9200.16420 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 6.2.9200.16384 | RAS PLAP Credential Provider
|
| | rasppp.dll | 6.2.9200.16384 | Remote Access PPP
|
| | rasser.dll | 6.2.9200.16420 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 6.2.9200.16384 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 6.2.9200.16384 | Remote Access PPP EAP-TLS
|
| | rdpcore.dll | 6.2.9200.16384 | RDP Core DLL
|
| | rdpencom.dll | 6.2.9200.16384 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 6.2.9200.16384 | RDP Audio Endpoint
|
| | rdvvmtransport.dll | 6.2.9200.16384 | RdvVmTransport EndPoints
|
| | reagent.dll | 6.2.9200.16548 | Microsoft Windows Recovery Agent DLL
|
| | redemption.dll | 4.8.0.1184 | Outlook Redemption COM library
|
| | regapi.dll | 6.2.9200.16384 | Registry Configuration APIs
|
| | regctrl.dll | 6.2.9200.16384 | RegCtrl
|
| | remotepg.dll | 6.2.9200.16384 | Remote Sessions CPL Extension
|
| | removedevicecontexthandler.dll | 6.2.9200.16384 | Devices & Printers Remove Device Context Menu Handler
|
| | removedeviceelevated.dll | 6.2.9200.16384 | RemoveDeviceElevated Proxy Dll
|
| | resampledmo.dll | 6.2.9200.16384 | Windows Media Resampler
|
| | resutils.dll | 6.2.9200.16384 | Microsoft Cluster Resource Utility DLL
|
| | rgb9rast.dll | 6.2.9200.16384 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1230 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 6.2.9200.16384 | Wrapper Dll for Richedit 1.0
|
| | rnr20.dll | 6.2.9200.16384 | Windows Socket2 NameSpace DLL
|
| | rometadata.dll | 4.0.30319.17929 | Microsoft MetaData Library
|
| | rpchttp.dll | 6.2.9200.16384 | RPC HTTP DLL
|
| | rpcns4.dll | 6.2.9200.16384 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 6.2.9200.16384 | RPC Netshell Helper
|
| | rpcrt4.dll | 6.2.9200.16384 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 6.2.9200.16384 | Remote RPC Extension
|
| | rsaenh.dll | 6.2.9200.16553 | Microsoft Enhanced Cryptographic Provider
|
| | rshx32.dll | 6.2.9200.16384 | Security Shell Extension
|
| | rstrtmgr.dll | 6.2.9200.16384 | Restart Manager
|
| | rtffilt.dll | 2008.0.9200.16384 | RTF Filter
|
| | rtm.dll | 6.2.9200.16384 | Routing Table Manager
|
| | rtutils.dll | 6.2.9200.16384 | Routing Utilities
|
| | samcli.dll | 6.2.9200.16384 | Security Accounts Manager Client DLL
|
| | samlib.dll | 6.2.9200.16496 | SAM Library DLL
|
| | sas.dll | 6.2.9200.16384 | WinLogon Software SAS Library
|
| | sbe.dll | 6.6.9200.16384 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.9200.16384 | Stream Buffer IO DLL
|
| | sberes.dll | 6.6.9200.16384 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 6.2.9200.16384 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 6.2.9200.16384 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 6.2.9200.16384 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 6.2.9200.16384 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 6.2.9200.16578 | TLS / SSL Security Provider
|
| | schedcli.dll | 6.2.9200.16384 | Scheduler Service Client DLL
|
| | scksp.dll | 6.2.9200.16384 | Microsoft Smart Card Key Storage Provider
|
| | scripto.dll | 6.6.9200.16384 | Microsoft ScriptO
|
| | scrobj.dll | 5.8.9200.16384 | Windows ® Script Component Runtime
|
| | scrrun.dll | 5.8.9200.16384 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 6.2.9200.16384 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 6.2.9200.16384 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 6.2.9200.16384 | NPS SDO Helper Component
|
| | searchfolder.dll | 6.2.9200.16384 | SearchFolder
|
| | sechost.dll | 6.2.9200.16384 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 6.2.9200.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 6.2.9200.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 6.2.9200.16384 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 6.2.9200.16384 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 6.2.9200.16384 | Security Support Provider Interface
|
| | security.dll | 6.2.9200.16384 | Security Support Provider Interface
|
| | sendmail.dll | 6.2.9200.16384 | Send Mail
|
| | sensapi.dll | 6.2.9200.16384 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 6.2.9200.16384 | Sensor API
|
| | sensorscpl.dll | 6.2.9200.16384 | Open Location and Other Sensors
|
| | serialui.dll | 6.2.9200.16384 | Serial Port Property Pages
|
| | serwvdrv.dll | 6.2.9200.16384 | Unimodem Serial Wave driver
|
| | sessenv.dll | 6.2.9200.16384 | Remote Desktop Configuration service
|
| | settingmonitor.dll | 6.2.9200.16384 | Setting Synchronization Change Monitor
|
| | settingsync.dll | 6.2.9200.16518 | Setting Synchronization
|
| | settingsyncinfo.dll | 6.2.9200.16384 | Setting Synchronization Information
|
| | setupapi.dll | 6.2.9200.16496 | Windows Setup API
|
| | setupcln.dll | 6.2.9200.16384 | Setup Files Cleanup
|
| | sfc.dll | 6.2.9200.16384 | Windows File Protection
|
| | sfc_os.dll | 6.2.9200.16384 | Windows File Protection
|
| | sfcom.dll | 3.0.0.11 | SFCOM.DLL
|
| | shacct.dll | 6.2.9200.16384 | Shell Accounts Classes
|
| | shcore.dll | 6.2.9200.16433 | SHCORE
|
| | shdocvw.dll | 6.2.9200.16550 | Shell Doc Object and Control Library
|
| | shell32.dll | 6.2.9200.16550 | Windows Shell Common Dll
|
| | shellstyle.dll | 6.2.9200.16384 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 6.2.9200.16384 | Shell Folder Service
|
| | shgina.dll | 6.2.9200.16384 | Windows Shell User Logon
|
| | shimeng.dll | 6.2.9200.16420 | Shim Engine DLL
|
| | shimgvw.dll | 6.2.9200.16384 | Photo Gallery Viewer
|
| | shlwapi.dll | 6.2.9200.16384 | Shell Light-weight Utility Library
|
| | shpafact.dll | 6.2.9200.16384 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 6.2.9200.16384 | Shell setup helper
|
| | shsvcs.dll | 6.2.9200.16384 | Windows Shell Services Dll
|
| | shunimpl.dll | 6.2.9200.16384 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 6.2.9200.16384 | Windows Shell Web Services
|
| | signdrv.dll | 6.2.9200.16384 | WMI provider for Signed Drivers
|
| | simauth.dll | 6.2.9200.16384 | EAP SIM run-time dll
|
| | simcfg.dll | 6.2.9200.16384 | EAP SIM config dll
|
| | sisbkup.dll | 6.2.9200.16384 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 6.2.9200.16384 | Software Licensing Client Dll
|
| | slcext.dll | 6.2.9200.16384 | Software Licensing Client Extension Dll
|
| | slwga.dll | 6.2.9200.16384 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 6.2.9200.16384 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | smspace.dll | 6.2.9200.16384 | Storage Management Provider for Spaces
|
| | sndvolsso.dll | 6.2.9200.16384 | SCA Volume
|
| | snmpapi.dll | 6.2.9200.16384 | SNMP Utility Library
|
| | softkbd.dll | 6.2.9200.16384 | Soft Keyboard Server and Tip
|
| | softpub.dll | 6.2.9200.16384 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 6.2.9200.16384 | Sort Version Server 2003
|
| | sortwindows61.dll | 6.2.9200.16384 | SortWindows61 Dll
|
| | sortwindows6compat.dll | 6.2.9200.16384 | Sort Version Windows 6.0
|
| | spbcd.dll | 6.2.9200.16384 | BCD Sysprep Plugin
|
| | spfileq.dll | 6.2.9200.16384 | Windows SPFILEQ
|
| | spinf.dll | 6.2.9200.16384 | Windows SPINF
|
| | spnet.dll | 6.2.9200.16384 | Net Sysprep Plugin
|
| | spopk.dll | 6.2.9200.16384 | OPK Sysprep Plugin
|
| | spp.dll | 6.2.9200.16384 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 6.2.9200.16384 | Software Licensing Client Dll
|
| | sppcext.dll | 6.2.9200.16384 | Software Protection Platform Client Extension Dll
|
| | sppinst.dll | 6.2.9200.16384 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 6.2.9200.16384 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 6.2.9200.16384 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 6.2.9200.16384 | Setup Wizard Framework
|
| | spwizimg.dll | 6.2.9200.16384 | Setup Wizard Framework Resources
|
| | spwizres.dll | 6.2.9200.16384 | Setup Wizard Framework Resources
|
| | spwmp.dll | 6.2.9200.16420 | Windows Media Player System Preparation DLL
|
| | sqlcecompact40.dll | 4.0.8275.1 | Database Repair Tool (32-bit)
|
| | sqlceoledb40.dll | 4.0.9200.1 | OLEDB Provider (32-bit)
|
| | sqlceqp40.dll | 4.0.9200.1 | Query Processor (32-bit)
|
| | sqlcese40.dll | 4.0.9200.1 | Storage Engine (32-bit)
|
| | sqloledb.dll | 6.2.9200.16384 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 6.2.9200.16384 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 2000.80.2039.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 2000.80.2040.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 6.2.9200.16384 | XML extensions for SQL Server
|
| | sqmapi.dll | 6.2.9200.16384 | SQM Client
|
| | srchadmin.dll | 7.0.9200.16384 | Indexing Options
|
| | srclient.dll | 6.2.9200.16384 | Microsoft® Windows System Restore Client Library
|
| | srh.dll | 6.2.9200.16384 | Screen Reader Helper DLL
|
| | srumapi.dll | 6.2.9200.16384 | System Resource Usage Monitor API
|
| | srumsvc.dll | 6.2.9200.16384 | System Resource Usage Monitor Service
|
| | srvcli.dll | 6.2.9200.16384 | Server Service Client DLL
|
| | sscore.dll | 6.2.9200.16384 | Server Service Core DLL
|
| | ssdpapi.dll | 6.2.9200.16384 | SSDP Client API DLL
|
| | sspicli.dll | 6.2.9200.16420 | Security Support Provider Interface
|
| | ssshim.dll | 6.2.9200.16384 | Windows Componentization Platform Servicing API
|
| | startupscan.dll | 6.2.9200.16384 | Startup scan task DLL
|
| | stclient.dll | 2001.12.10130.16384 | COM+ Configuration Catalog Client
|
| | sti.dll | 6.2.9200.16384 | Still Image Devices client DLL
|
| | stobject.dll | 6.2.9200.16604 | Systray shell service object
|
| | storage.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | storagecontexthandler.dll | 6.2.9200.16384 | Device Center Storage Context Menu Handler
|
| | storagewmi.dll | 6.2.9200.16465 | WMI Provider for Storage Management
|
| | storagewmi_passthru.dll | 6.2.9200.16384 | WMI PassThru Provider for Storage Management
|
| | storprop.dll | 6.2.9200.16384 | Property Pages for Storage Devices
|
| | storsvc.dll | 6.2.9200.16384 | Storage Services
|
| | structuredquery.dll | 7.0.9200.16433 | Structured Query
|
| | sud.dll | 6.2.9200.16384 | SUD Control Panel
|
| | sxproxy.dll | 6.2.9200.16384 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 6.2.9200.16384 | Fusion 2.5
|
| | sxshared.dll | 6.2.9200.16384 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 6.2.9200.16384 | Sxs Store DLL
|
| | synccenter.dll | 6.2.9200.16384 | Microsoft Sync Center
|
| | synceng.dll | 6.2.9200.16432 | Windows Briefcase Engine
|
| | synchostps.dll | 6.2.9200.16384 | Proxystub for sync host
|
| | syncinfrastructure.dll | 6.2.9200.16384 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 6.2.9200.16384 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncreg.dll | 2007.94.9200.16384 | Microsoft Synchronization Framework Registration
|
| | syncui.dll | 6.2.9200.16384 | Windows Briefcase
|
| | syssetup.dll | 6.2.9200.16384 | Windows NT System Setup
|
| | systemcpl.dll | 6.2.9200.16384 | My System CPL
|
| | systemeventsbrokerclient.dll | 6.2.9200.16384 | system Events Broker Client Library
|
| | t2embed.dll | 6.2.9200.16384 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 6.2.9200.16384 | Microsoft TAPI3
|
| | tapi32.dll | 6.2.9200.16384 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 6.2.9200.16384 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 6.2.9200.16384 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 6.2.9200.16384 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 6.2.9200.16384 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 6.2.9200.16384 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 6.2.9200.16384 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 6.2.9200.16384 | Task Scheduler COM API
|
| | taskschdps.dll | 6.2.9200.16384 | Task Scheduler Interfaces Proxy
|
| | tbs.dll | 6.2.9200.16384 | TBS
|
| | tcpipcfg.dll | 6.2.9200.16384 | Network Configuration Objects
|
| | tcpmib.dll | 6.2.9200.16384 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 6.2.9200.16384 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 6.2.9200.16384 | Event Trace Helper Library
|
| | termmgr.dll | 6.2.9200.16384 | Microsoft TAPI3 Terminal Manager
|
| | thawbrkr.dll | 6.2.9200.16384 | Thai Word Breaker
|
| | themecpl.dll | 6.2.9200.16384 | Personalization CPL
|
| | themeui.dll | 6.2.9200.16384 | Windows Theme API
|
| | threadpoolwinrt.dll | 6.2.9200.16384 | Windows WinRT Threadpool
|
| | thumbcache.dll | 6.2.9200.16384 | Microsoft Thumbnail Cache
|
| | timebrokerclient.dll | 6.2.9200.16384 | Time Broker Client Library
|
| | timedatemuicallback.dll | 6.2.9200.16384 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 6.2.9200.16384 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tpmcompc.dll | 6.2.9200.16384 | Computer Chooser Dialog
|
| | tquery.dll | 7.0.9200.16578 | Microsoft Tripoli Query
|
| | traffic.dll | 6.2.9200.16384 | Microsoft Traffic Control 1.0 DLL
|
| | tsbyuv.dll | 6.2.9200.16384 | Toshiba Video Codec
|
| | tschannel.dll | 6.2.9200.16384 | Task Scheduler Proxy
|
| | tsgqec.dll | 6.2.9200.16384 | RD Gateway QEC
|
| | tsmf.dll | 6.2.9200.16384 | RDP MF Plugin
|
| | tspkg.dll | 6.2.9200.16384 | Web Service Security Package
|
| | tsworkspace.dll | 6.2.9200.16384 | RemoteApp and Desktop Connection Component
|
| | ttlsauth.dll | 6.2.9200.16384 | EAP TTLS run-time dll
|
| | ttlscfg.dll | 6.2.9200.16384 | EAP TTLS configuration dll
|
| | tvratings.dll | 6.6.9200.16384 | Module for managing TV ratings
|
| | twext.dll | 6.2.9200.16384 | Previous Versions property page
|
| | twinapi.dll | 6.2.9200.16420 | twinapi
|
| | twinui.dll | 6.2.9200.16604 | TWINUI
|
| | txflog.dll | 2001.12.10130.16384 | COM+
|
| | txfw32.dll | 6.2.9200.16384 | TxF Win32 DLL
|
| | typelib.dll | 2.10.3029.1 | OLE 2.1 16/32 Interoperability Library
|
| | tzres.dll | 6.2.9200.16479 | Time Zones resource DLL
|
| | ubpm.dll | 6.2.9200.16604 | Unified Background Process Manager DLL
|
| | ucmhc.dll | 6.2.9200.16384 | UCM Helper Class
|
| | udhisapi.dll | 6.2.9200.16384 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 6.2.9200.16384 | eXfat Utility DLL
|
| | ufat.dll | 6.2.9200.16384 | FAT Utility DLL
|
| | uianimation.dll | 6.2.9200.16384 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.2.9200.16384 | Microsoft UI Automation Core
|
| | uiautomationcoreres.dll | 7.2.9200.16384 | Microsoft UI Automation Core Resource
|
| | uicom.dll | 6.2.9200.16384 | Add/Remove Modems
|
| | uireng.dll | 6.2.9200.16384 | UI Recording Engine Library
|
| | uiribbon.dll | 6.2.9200.16384 | Windows Ribbon Framework
|
| | uiribbonres.dll | 6.2.9200.16384 | Windows Ribbon Framework Resources
|
| | ulib.dll | 6.2.9200.16384 | File Utilities Support DLL
|
| | umdmxfrm.dll | 6.2.9200.16384 | Unimodem Tranform Module
|
| | unimdmat.dll | 6.2.9200.16384 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 6.2.9200.16384 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | untfs.dll | 6.2.9200.16384 | NTFS Utility DLL
|
| | upnp.dll | 6.2.9200.16384 | UPnP Control Point API
|
| | upnphost.dll | 6.2.9200.16384 | UPnP Device Host
|
| | ureg.dll | 6.2.9200.16384 | Registry Utility DLL
|
| | url.dll | 10.0.9200.16384 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 10.0.9200.16598 | OLE32 Extensions for Win32
|
| | usbceip.dll | 6.2.9200.16384 | USBCEIP Task
|
| | usbperf.dll | 6.2.9200.16384 | USB Performance Objects DLL
|
| | usbui.dll | 6.2.9200.16384 | USB UI Dll
|
| | user32.dll | 6.2.9200.16420 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 6.2.9200.16384 | UserAccountControlSettings
|
| | usercpl.dll | 6.2.9200.16433 | User control panel
|
| | userenv.dll | 6.2.9200.16384 | Userenv
|
| | userinitext.dll | 6.2.9200.16384 | UserInit Utility Extension DLL
|
| | userlanguageprofilecallback.dll | 6.2.9200.16384 | MUI Callback for User Language profile changed
|
| | userlanguagescpl.dll | 6.2.9200.16465 | My Languages Configuration Control Panel
|
| | usp10.dll | 6.2.9200.16384 | Uniscribe Unicode script processor
|
| | ustprov.dll | 6.2.9200.16384 | User State WMI Provider
|
| | utildll.dll | 6.2.9200.16384 | WinStation utility support DLL
|
| | uudf.dll | 6.2.9200.16384 | UDF Utility DLL
|
| | uxinit.dll | 6.2.9200.16611 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 6.2.9200.16384 | Setup Wizard Framework
|
| | uxlibres.dll | 6.2.9200.16384 | UXLib Resources
|
| | uxtheme.dll | 6.2.9200.16537 | Microsoft UxTheme Library
|
| | van.dll | 6.2.9200.16420 | View Available Networks
|
| | vault.dll | 6.2.9200.16384 | Windows vault Control Panel
|
| | vaultcli.dll | 6.2.9200.16384 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbscript.dll | 5.8.9200.16384 | Microsoft ® VBScript
|
| | vccorlib110.dll | 11.0.50727.1 | Microsoft ® VC WinRT core library
|
| | vccorlib110d.dll | 11.0.50727.1 | Microsoft ® VC WinRT core library
|
| | vccorlib140.dll | 14.0.23506.0 | Microsoft ® VC WinRT core library
|
| | vcomp100.dll | 10.0.40219.325 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp110.dll | 11.0.50727.1 | Microsoft® C/C++ OpenMP Runtime
|
| | vcruntime140.dll | 14.0.23506.0 | Microsoft® C Runtime Library
|
| | vdmdbg.dll | 6.2.9200.16384 | VDMDBG.DLL
|
| | vds_ps.dll | 6.2.9200.16465 | Microsoft® Virtual Disk Service proxy/stub
|
| | verifier.dll | 6.2.9200.16384 | Standard application verifier provider dll
|
| | version.dll | 6.2.9200.16384 | Version Checking and File Installation Libraries
|
| | vfwwdm32.dll | 6.2.9200.16384 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 6.2.9200.16384 | Windows Media Resizer
|
| | virtdisk.dll | 6.2.9200.16384 | Virtual Disk API DLL
|
| | vpnikeapi.dll | 6.2.9200.16384 | VPN IKE API's
|
| | vscmgrps.dll | 6.2.9200.16384 | Microsoft Virtual Smart Card Manager Proxy/Stub
|
| | vss_ps.dll | 6.2.9200.16384 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 6.2.9200.16420 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 6.2.9200.16420 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 6.2.9200.16384 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 6.2.9200.16384 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 6.2.9200.16384 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 6.2.9200.16384 | Microsoft Windows Contacts Sync Provider
|
| | wavemsp.dll | 6.2.9200.16384 | Microsoft Wave MSP
|
| | wbemcomn.dll | 6.2.9200.16384 | WMI
|
| | wcmapi.dll | 6.2.9200.16384 | Windows Connection Manager Client API
|
| | wcnapi.dll | 6.2.9200.16451 | Windows Connect Now - API Helper DLL
|
| | wcnwiz.dll | 6.2.9200.16384 | Windows Connect Now Wizards
|
| | wcspluginservice.dll | 6.2.9200.16384 | WcsPlugInService DLL
|
| | wdc.dll | 6.2.9200.16384 | Performance Monitor
|
| | wdi.dll | 6.2.9200.16384 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 6.2.9200.16384 | Microsoft Digest Access
|
| | wdscore.dll | 6.2.9200.16384 | Panther Engine Module
|
| | webcamui.dll | 6.2.9200.16465 | Microsoft® Windows® Operating System
|
| | webcheck.dll | 10.0.9200.16384 | Web Site Monitor
|
| | webclnt.dll | 6.2.9200.16384 | Web DAV Service DLL
|
| | webio.dll | 6.2.9200.16420 | Web Transfer Protocols API
|
| | webservices.dll | 6.2.9200.16384 | Windows Web Services Runtime
|
| | websocket.dll | 6.2.9200.16384 | Web Socket API
|
| | wecapi.dll | 6.2.9200.16384 | Event Collector Configuration API
|
| | wer.dll | 6.2.9200.16384 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 6.2.9200.16384 | WER Diagnostic Controller
|
| | werui.dll | 6.2.9200.16384 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 6.2.9200.16384 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 6.2.9200.16384 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 6.2.9200.16433 | Windows Firewall GPO Helper dll
|
| | wfdprov.dll | 6.2.9200.16451 | Private WPS provisioning API DLL for Wi-Fi Direct
|
| | wfhc.dll | 6.2.9200.16384 | Windows Firewall Helper Class
|
| | whhelper.dll | 6.2.9200.16384 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 6.2.9200.16384 | WIA Automation Layer
|
| | wiadefui.dll | 6.2.9200.16384 | WIA Scanner Default UI
|
| | wiadss.dll | 6.2.9200.16384 | WIA TWAIN compatibility layer
|
| | wiascanprofiles.dll | 6.2.9200.16384 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 6.2.9200.16384 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 6.2.9200.16384 | WIA Tracing
|
| | wimgapi.dll | 6.2.9200.16384 | Windows Imaging Library
|
| | winbio.dll | 6.2.9200.16384 | Windows Biometrics Client API
|
| | winbrand.dll | 6.2.9200.16384 | Windows Branding Resources
|
| | wincredprovider.dll | 6.2.9200.16384 | wincredprovider DLL
|
| | windows.applicationmodel.background.systemeventsbroker.dll | 6.2.9200.16384 | Windows Background System Events Broker API Server
|
| | windows.applicationmodel.background.timebroker.dll | 6.2.9200.16384 | Windows Background Time Broker API Server
|
| | windows.applicationmodel.dll | 6.2.9200.16384 | Windows ApplicationModel API Server
|
| | windows.applicationmodel.store.dll | 6.2.9200.16420 | Windows Store Runtime DLL
|
| | windows.applicationmodel.store.testingframework.dll | 6.2.9200.16420 | Windows Store Testing Framework Runtime DLL
|
| | windows.devices.enumeration.dll | 6.2.9200.16384 | Windows.Devices.Enumeration
|
| | windows.devices.enumeration.ps.dll | 6.2.9200.16384 | Windows.Devices.Enumeration Interface Proxy
|
| | windows.devices.geolocation.dll | 6.2.9200.16384 | Geolocation Runtime DLL
|
| | windows.devices.portable.dll | 6.2.9200.16384 | Windows Runtime Portable Devices DLL
|
| | windows.devices.printers.extensions.dll | 6.2.9200.16384 | Windows.Devices.Printers.Extensions
|
| | windows.devices.sensors.dll | 6.2.9200.16384 | Windows Runtime Sensors DLL
|
| | windows.globalization.dll | 6.2.9200.16384 | Windows Globalization
|
| | windows.globalization.fontgroups.dll | 6.2.9200.16384 | Fonts Mapping API
|
| | windows.graphics.dll | 6.2.9200.16384 | WinRT Windows Graphics DLL
|
| | windows.graphics.printing.dll | 6.2.9200.16384 | Microsoft Windows Printing Support
|
| | windows.media.devices.dll | 6.2.9200.16384 | Windows Runtime media device server DLL
|
| | windows.media.dll | 6.2.9200.16496 | Windows Media Runtime DLL
|
| | windows.media.mediacontrol.dll | 6.2.9200.16384 | Windows Runtime MediaControl server DLL
|
| | windows.media.streaming.dll | 12.0.9200.16420 | DLNA DLL
|
| | windows.media.streaming.ps.dll | 12.0.9200.16384 | DLNA Proxy-Stub DLL
|
| | windows.networking.backgroundtransfer.dll | 6.2.9200.16578 | Windows.Networking.BackgroundTransfer DLL
|
| | windows.networking.connectivity.dll | 6.2.9200.16518 | Windows Networking Connectivity Runtime DLL
|
| | windows.networking.dll | 6.2.9200.16578 | Windows.Networking DLL
|
| | windows.networking.networkoperators.hotspotauthentication.dll | 6.2.9200.16384 | Microsoft Windows Hotspot Authentication API
|
| | windows.networking.proximity.dll | 6.2.9200.16384 | Windows Runtime Proximity API DLL
|
| | windows.networking.sockets.pushenabledapplication.dll | 6.2.9200.16384 | Windows.Networking.Sockets.PushEnabledApplication DLL
|
| | windows.security.authentication.onlineid.dll | 6.2.9200.16384 | Windows Runtime OnlineId Authentication DLL
|
| | windows.security.credentials.ui.credentialpicker.dll | 6.2.9200.16384 | WinRT Credential Picker Server
|
| | windows.storage.applicationdata.dll | 6.2.9200.16384 | Windows Application Data API Server
|
| | windows.storage.compression.dll | 6.2.9200.16433 | WinRT Compression
|
| | windows.system.display.dll | 6.2.9200.16384 | Windows System Display Runtime DLL
|
| | windows.system.profile.hardwareid.dll | 6.2.9200.16384 | Windows System Profile HardwareId DLL
|
| | windows.system.remotedesktop.dll | 6.2.9200.16384 | Windows System RemoteDesktop Runtime DLL
|
| | windows.ui.dll | 6.2.9200.16384 | Windows Runtime UI Foundation DLL
|
| | windows.ui.immersive.dll | 6.2.9200.16433 | WINDOWS.UI.IMMERSIVE
|
| | windows.ui.input.inking.dll | 6.2.9200.16384 | WinRT Windows Inking DLL
|
| | windows.ui.xaml.dll | 6.2.9200.16604 | Windows.UI.Xaml dll
|
| | windows.web.dll | 6.2.9200.16384 | Web Client DLL
|
| | windowscodecs.dll | 6.2.9200.16420 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 6.2.9200.16384 | Microsoft Windows Codecs Extended Library
|
| | windowslivelogin.dll | 6.2.9200.16384 | Microsoft® Account Login Helper
|
| | winfax.dll | 6.2.9200.16384 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 6.2.9200.16451 | Windows HTTP Services
|
| | wininet.dll | 10.0.9200.16598 | Internet Extensions for Win32
|
| | wininitext.dll | 6.2.9200.16384 | WinInit Utility Extension DLL
|
| | winipsec.dll | 6.2.9200.16384 | Windows IPsec SPD Client DLL
|
| | winlangdb.dll | 6.2.9200.16384 | Windows Bcp47 Language Database
|
| | winmde.dll | 12.0.9200.16465 | WinMDE DLL
|
| | winmm.dll | 6.2.9200.16384 | MCI API DLL
|
| | winmmbase.dll | 6.2.9200.16384 | Base Multimedia Extension API DLL
|
| | winmsoirmprotector.dll | 6.2.9200.16384 | Windows Office file format IRM Protector
|
| | winnsi.dll | 6.2.9200.16384 | Network Store Information RPC interface
|
| | winopcirmprotector.dll | 6.2.9200.16384 | Windows Office file format IRM Protector
|
| | winrnr.dll | 6.2.9200.16384 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 6.2.9200.16384 | remtsvc
|
| | winrsmgr.dll | 6.2.9200.16384 | WSMan Shell API
|
| | winrssrv.dll | 6.2.9200.16384 | winrssrv
|
| | winsatapi.dll | 6.2.9200.16420 | Windows System Assessment Tool API
|
| | winscard.dll | 6.2.9200.16384 | Microsoft Smart Card API
|
| | winshfhc.dll | 6.2.9200.16384 | File Risk Estimation
|
| | winsku.dll | 6.2.9200.16384 | Windows SKU Library
|
| | winsockhc.dll | 6.2.9200.16384 | Winsock Network Diagnostic Helper Class
|
| | winsrpc.dll | 6.2.9200.16384 | WINS RPC LIBRARY
|
| | winsta.dll | 6.2.9200.16384 | Winstation Library
|
| | winsync.dll | 2007.94.9200.16384 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.9200.16384 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.9200.16384 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 6.2.9200.16420 | Microsoft Trust Verification APIs
|
| | wintypes.dll | 6.2.9200.16420 | Windows Base Types DLL
|
| | winusb.dll | 6.2.9200.16384 | Windows USB Driver User Library
|
| | wisp.dll | 6.2.9200.16384 | Microsoft Pen and Touch Input Component
|
| | wkscli.dll | 6.2.9200.16384 | Workstation Service Client DLL
|
| | wkspbrokerax.dll | 6.2.9200.16384 | Microsoft Workspace Broker ActiveX Control
|
| | wksprtps.dll | 6.2.9200.16384 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 6.2.9200.16451 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 6.2.9200.16384 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 6.2.9200.16384 | Dot11 Connection Flows
|
| | wlandlg.dll | 6.2.9200.16384 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 6.2.9200.16384 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 6.2.9200.16451 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlaninst.dll | 6.2.9200.16384 | Windows NET Device Class Co-Installer for Wireless LAN
|
| | wlanmm.dll | 6.2.9200.16384 | Dot11 Media and AdHoc Managers
|
| | wlanmsm.dll | 6.2.9200.16451 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 6.2.9200.16384 | Wireless Preferred Networks
|
| | wlansec.dll | 6.2.9200.16451 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 6.2.9200.16384 | Wireless Profile UI
|
| | wlanutil.dll | 6.2.9200.16384 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 6.2.9200.16384 | Win32 LDAP API DLL
|
| | wlgpclnt.dll | 6.2.9200.16384 | 802.11 Group Policy Client
|
| | wlidcli.dll | 6.2.9200.16384 | Microsoft® Account Dynamic Link Library
|
| | wlidcredprov.dll | 6.2.9200.16420 | Microsoft® Account Credential Provider
|
| | wlidfdp.dll | 6.2.9200.16384 | Microsoft® Account Function Discovery Provider
|
| | wlidnsp.dll | 6.2.9200.16384 | Microsoft® Account Namespace Provider
|
| | wlidprov.dll | 6.2.9200.16384 | Microsoft® Account Provider
|
| | wlidres.dll | 6.2.9200.16384 | Microsoft® Windows Live ID Resource
|
| | wlroamextension.dll | 6.2.9200.16518 | Windows Live Roaming Sync Extension
|
| | wls0wndh.dll | 6.2.9200.16384 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 6.2.9200.16384 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 6.2.9200.16384 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.9200.16384 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 6.2.9200.16384 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.9200.16384 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.9200.16384 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.9200.16384 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.9200.16384 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.9200.16384 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.9200.16384 | Windows Media Error Definitions (English)
|
| | wmi.dll | 6.2.9200.16384 | WMI DC and DP functionality
|
| | wmiclnt.dll | 6.2.9200.16384 | WMI Client API
|
| | wmidcom.dll | 6.2.9200.16384 | WMI
|
| | wmidx.dll | 12.0.9200.16384 | Windows Media Indexer DLL
|
| | wmiprop.dll | 6.2.9200.16384 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmitomi.dll | 6.2.9200.16384 | CIM Provider Adapter
|
| | wmnetmgr.dll | 12.0.9200.16384 | Windows Media Network Plugin Manager DLL
|
| | wmof64.dll | 1.0.0.0 | Resource only DLL containing MOF for ASL code
|
| | wmp.dll | 12.0.9200.16578 | Windows Media Player
|
| | wmpdxm.dll | 12.0.9200.16384 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.9200.16384 | Windows Media Player Effects
|
| | wmphoto.dll | 6.2.9200.16384 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.9200.16420 | Windows Media Player Resources
|
| | wmpps.dll | 12.0.9200.16384 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.9200.16384 | Windows Media Player Launcher
|
| | wmsgapi.dll | 6.2.9200.16384 | WinLogon IPC Client
|
| | wmspdmod.dll | 6.2.9200.16384 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 6.2.9200.16384 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.9200.16384 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 6.2.9200.16384 | Windows Media Video Decoder
|
| | wmvdspa.dll | 6.2.9200.16384 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 6.2.9200.16384 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 6.2.9200.16384 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 6.2.9200.16384 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 6.2.9200.16384 | Windows Media Video Encoder
|
| | wow32.dll | 6.2.9200.16384 | Wow32
|
| | wpc.dll | 6.2.9200.16384 | WPC Settings Library
|
| | wpcsvc.dll | 6.2.9200.16384 | WPC Filtering Service
|
| | wpdshext.dll | 6.2.9200.16384 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 6.2.9200.16384 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 6.2.9200.16384 | WMDM Service Provider for Windows Portable Devices
|
| | wpdwcn.dll | 6.2.9200.16384 | Windows Portable Device WCN Wizard
|
| | wpnapps.dll | 6.2.9200.16465 | Windows Push Notification Apps
|
| | ws2_32.dll | 6.2.9200.16384 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 6.2.9200.16384 | Windows Socket 2.0 Helper for Windows NT
|
| | wsabi.dll | 1.0.0.3 | WSABI
|
| | wscapi.dll | 6.2.9200.16578 | Windows Security Center API
|
| | wscinterop.dll | 6.2.9200.16384 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 6.2.9200.16384 | Windows Security Center ISV API
|
| | wsclient.dll | 6.2.9200.16420 | Windows Store Licensing Client
|
| | wscproxystub.dll | 6.2.9200.16384 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 6.2.9200.16384 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 6.2.9200.16384 | WSD Challenge Component
|
| | wsecedit.dll | 6.2.9200.16384 | Security Configuration UI Module
|
| | wshbth.dll | 6.2.9200.16384 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.8.9200.16384 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 6.2.9200.16384 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.8.9200.16384 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 6.2.9200.16384 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 6.2.9200.16384 | Windows Sockets Helper DLL
|
| | wshqos.dll | 6.2.9200.16384 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 6.2.9200.16384 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 6.2.9200.16384 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmagent.dll | 6.2.9200.16384 | WinRM Agent
|
| | wsmanmigrationplugin.dll | 6.2.9200.16384 | WinRM Migration Plugin
|
| | wsmauto.dll | 6.2.9200.16384 | WSMAN Automation
|
| | wsmplpxy.dll | 6.2.9200.16384 | wsmplpxy
|
| | wsmres.dll | 6.2.9200.16384 | WSMan Resource DLL
|
| | wsmsvc.dll | 6.2.9200.16384 | WSMan Service
|
| | wsmwmipl.dll | 6.2.9200.16384 | WSMAN WMI Provider
|
| | wsnmp32.dll | 6.2.9200.16384 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 6.2.9200.16384 | Windows Socket 32-Bit DLL
|
| | wsshared.dll | 6.2.9200.16420 | WSShared DLL
|
| | wssync.dll | 6.2.9200.16420 | Windows Store Licensing Sync Client
|
| | wtsapi32.dll | 6.2.9200.16384 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 7.8.9200.16604 | Windows Update Client API
|
| | wudriver.dll | 7.8.9200.16604 | Windows Update WUDriver Stub
|
| | wups.dll | 7.8.9200.16451 | Windows Update client proxy stub
|
| | wuwebv.dll | 7.8.9200.16604 | Windows Update Vista Web Control
|
| | wvc.dll | 6.2.9200.16384 | Windows Visual Components
|
| | wwaapi.dll | 6.2.9200.16384 | Microsoft Web Application Host API library
|
| | wwanapi.dll | 6.2.9200.16518 | Mbnapi
|
| | wwapi.dll | 8.1.9200.16384 | WWAN API
|
| | xapofx1_5.dll | 9.29.1962.0 | Audio Effect Library
|
| | xaudio2_7.dll | 9.29.1962.0 | XAudio2 Game Audio API
|
| | xaudio2_8.dll | 6.2.9200.16384 | XAudio2 Game Audio API
|
| | xinput1_4.dll | 6.2.9200.16384 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 6.2.9200.16384 | XNA Common Controller
|
| | xmlfilter.dll | 2008.0.9200.16384 | XML Filter
|
| | xmllite.dll | 6.2.9200.16384 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 6.2.9200.16384 | Network Provisioning Service Client API
|
| | xmlrw.dll | 2011.110.2809.27 | Microsoft XML Slim Library
|
| | xmlrwbin.dll | 2011.110.2809.27 | Microsoft XML Slim Library
|
| | xolehlp.dll | 2001.12.10130.16384 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsfilt.dll | 6.2.9200.16384 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 6.2.9200.16578 | XPS to GDI Converter
|
| | xpsprint.dll | 6.2.9200.16384 | XPS Printing DLL
|
| | xpsrasterservice.dll | 6.2.9200.16518 | XPS Rasterization Service Component
|
| | xpsservices.dll | 6.2.9200.16384 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 6.2.9200.16384 | OPC Shell Metadata Handler
|
| | xpssvcs.dll | 6.2.9200.16384 | Native Code Xps Services Library
|
| | xwizards.dll | 6.2.9200.16384 | Extensible Wizards Manager Module
|
| | xwreg.dll | 6.2.9200.16384 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 6.2.9200.16384 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 6.2.9200.16384 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 6.2.9200.16384 | Compressed (zipped) Folders
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Warning | None | 2016-02-27 00:23:01 | SYSTEM | Microsoft-Windows-User Profiles Service | 1534: Profile notification of event Delete for component {DE3F3560-3032-41B4-B6CF-F703B1B95640} failed, error code is ???.
|
| | Application | Warning | None | 2016-02-27 00:23:02 | SYSTEM | Microsoft-Windows-User Profiles Service | 1534: Profile notification of event Delete for component {D63AA156-D534-4BAC-9BF1-55359CF5EC30} failed, error code is The system cannot find the path specified. .
|
| | Application | Warning | None | 2016-02-27 00:27:31 | | Wlclntfy | 6005: The winlogon notification subscriber <AUInstallAgent> is taking long time to handle the notification event (StartShell).
|
| | Application | Warning | None | 2016-02-27 00:28:50 | | Wlclntfy | 6006: The winlogon notification subscriber <AUInstallAgent> took 138 second(s) to handle the notification event (StartShell).
|
| | Application | Warning | None | 2016-02-27 00:28:52 | SYSTEM | Microsoft-Windows-ApplicationExperienceInfrastructure | 1: The application (Intel Bluetooth Wireless High Speed, from vendor Intel) has the following problem: To function properly, Intel Bluetooth Wireless High Speed must be reinstalled after you upgrade Windows.
|
| | Application | Error | None | 2016-02-27 00:29:19 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0x80072EE7
|
| | Application | Error | None | 2016-02-27 00:29:19 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0x80072EE7 Sku Id=9e4b231b-3e45-41f4-967f-c914f178b6ac
|
| | Application | Error | None | 2016-02-27 00:29:19 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x80072EE7 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=9e4b231b-3e45-41f4-967f-c914f178b6ac;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Warning | None | 2016-02-27 00:35:30 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 5 user registry handles leaked from \Registry\User\S-1-5-21-4148812140-3900968213-992977265-1001: Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall
|
| | Application | Error | None | 2016-02-27 00:51:52 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0x80072EE7
|
| | Application | Error | None | 2016-02-27 00:51:52 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0x80072EE7 Sku Id=9e4b231b-3e45-41f4-967f-c914f178b6ac
|
| | Application | Error | None | 2016-02-27 00:51:52 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x80072EE7 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=9e4b231b-3e45-41f4-967f-c914f178b6ac;NotificationInterval=1440;Trigger=UserLogon;SessionId=2
|
| | Application | Warning | None | 2016-02-27 00:52:20 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 1 user registry handles leaked from \Registry\User\S-1-5-21-4148812140-3900968213-992977265-1001: Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall
|
| | Application | Warning | None | 2016-02-27 00:52:21 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 3 user registry handles leaked from \Registry\User\S-1-5-21-4148812140-3900968213-992977265-1001_Classes: Process 1976 (\Device\HarddiskVolume4\Program Files (x86)\Norton Internet Security\Engine\20.4.0.40\ccSvcHst.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001_CLASSES Process 1976 (\Device\HarddiskVolume4\Program Files (x86)\Norton Internet Security\Engine\20.4.0.40\ccSvcHst.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001_CLASSES Process 1976 (\Device\HarddiskVolume4\Program Files (x86)\Norton Internet Security\Engine\20.4.0.40\ccSvcHst.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001_CLASSES
|
| | Application | Error | None | 2016-02-27 18:45:45 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0x80072EE7
|
| | Application | Error | None | 2016-02-27 18:45:45 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0x80072EE7 Sku Id=9e4b231b-3e45-41f4-967f-c914f178b6ac
|
| | Application | Error | None | 2016-02-27 18:45:45 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x80072EE7 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=9e4b231b-3e45-41f4-967f-c914f178b6ac;NotificationInterval=1440;Trigger=UserLogon;SessionId=3
|
| | Application | Error | None | 2016-02-27 18:47:41 | | Customer Experience Improvement Program | 1008: A problem prevented Customer Experience Improvement Program data from being sent to Microsoft, (Error 80070005).
|
| | Application | Error | None | 2016-02-27 18:49:40 | | System Restore | 8193: Failed to create restore point (Process = D:\setup.exe ; Description = Installed Microsoft Office Professional Plus 2013; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:49:43 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:07 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:16 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:18 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:26 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:27 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:28 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:30 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:31 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:33 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:34 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:36 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:37 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:39 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:48 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:49 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:50 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:51 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:53 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:53 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:54 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:55 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:57 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:50:59 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:51:18 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:53:08 | | Software Protection Platform Service | 1017: Installation of the Proof of Purchase failed. 0xC004E016 Partial Pkey=GVGXT ACID=? Detailed Error[?]
|
| | Application | Error | None | 2016-02-27 18:53:08 | | Software Protection Platform Service | 1017: Installation of the Proof of Purchase failed. 0xC004E016 Partial Pkey=GVGXT ACID=? Detailed Error[?]
|
| | Application | Error | None | 2016-02-27 18:53:08 | home | MsiInstaller | 10005: Product: Microsoft Office Professional Plus 2013 -- Error 25004. The product key you entered cannot be used on this machine. This is most likely due to previous Office 2013 trials being installed. (System error: -1073422314)
|
| | Application | Error | None | 2016-02-27 18:54:46 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Removed Microsoft Office; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:54:48 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Removed Microsoft Office; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:55:38 | | System Restore | 8193: Failed to create restore point (Process = D:\setup.exe ; Description = Installed Microsoft Office Professional Plus 2013; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:55:40 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:55:55 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:04 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:05 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:12 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:13 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:14 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:16 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:17 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:19 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:20 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:21 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:22 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:24 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:29 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:29 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:30 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:31 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:32 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:33 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:34 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:34 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:37 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:38 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-27 18:56:53 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\msiexec.exe /V; Description = Installed PROPLUS; Error = 0x80070422).
|
| | Application | Warning | None | 2016-02-27 18:58:17 | | Software Protection Platform Service | 8233: The rules engine reported a failed VL activation attempt. Reason:0x8007267C AppId = 0ff1ce15-a989-479d-af46-f275c6370663, SkuId = b322da9c-a2e2-4058-9e4e-f59a6970bd69 Trigger=TimerEvent
|
| | Application | Warning | None | 2016-02-27 19:01:33 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 59 user registry handles leaked from \Registry\User\S-1-5-21-4148812140-3900968213-992977265-1001: Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\TrustedPeople Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\TrustedPeople Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\TrustedPeople Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\TrustedPeople Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Root Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Root Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Root Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Root Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\trust Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\trust Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\trust Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\trust Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Disallowed Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Disallowed Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Disallowed Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\Disallowed Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\SmartCardRoot Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\SmartCardRoot Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\SmartCardRoot Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\SmartCardRoot Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Policies\Microsoft\SystemCertificates Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\CA Process 688 (\Device\HarddiskVolume4\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\CA Process 4184 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\CA Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\SystemCertificates\CA
|
| | Application | Error | None | 2016-02-27 19:57:34 | | Perflib | 1021: Windows cannot open the 32-bit extensible counter DLL Outlook in a 64-bit environment. Contact the file vendor to obtain a 64-bit version. Alternatively, you can open the 32-bit extensible counter DLL by using the 32-bit version of Performance Monitor. To use this tool, open the Windows folder, open the Syswow64 folder, and then start Perfmon.exe.
|
| | Application | Error | None | 2016-02-27 19:57:35 | | Perflib | 1017: Disabled performance counter data collection from the "Outlook" service because the performance counter library for that service has generated one or more errors. The errors that forced this action have been written to the application event log. Correct the errors before enabling the performance counters for this service.
|
| | Application | Error | 100 | 2016-02-28 00:01:43 | | Application Error | 1000: Faulting application name: DllHost.exe, version: 6.2.9200.16384, time stamp: 0x50108850 Faulting module name: ntdll.dll, version: 6.2.9200.16579, time stamp: 0x51637f77 Exception code: 0xc0000005 Fault offset: 0x000000000005ab00 Faulting process id: 0xb4c Faulting application start time: 0x01d171808660144f Faulting application path: C:\windows\system32\DllHost.exe Faulting module path: C:\windows\SYSTEM32\ntdll.dll Report Id: c6762954-dd73-11e5-be7a-b4b676f504b9 Faulting package full name: Faulting package-relative application ID:
|
| | Application | Error | None | 2016-02-28 00:03:47 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\system32\svchost.exe -k netsvcs; Description = Windows Update; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-28 00:03:47 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.2.9200.16613_none_6273bd8950d6cae2\TiWorker.exe -Embedding; Description = Windows Modules Installer; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-28 00:03:55 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.2.9200.16613_none_6273bd8950d6cae2\TiWorker.exe -Embedding; Description = Windows Modules Installer; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-28 00:04:17 | | System Restore | 8193: Failed to create restore point (Process = C:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.2.9200.16613_none_6273bd8950d6cae2\TiWorker.exe -Embedding; Description = Windows Modules Installer; Error = 0x80070422).
|
| | Application | Warning | None | 2016-02-28 00:04:22 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 5 user registry handles leaked from \Registry\User\S-1-5-21-4148812140-3900968213-992977265-1001: Process 5092 (\Device\HarddiskVolume4\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001 Process 5092 (\Device\HarddiskVolume4\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Control Panel\Desktop Process 512 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Process 284 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-4148812140-3900968213-992977265-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall
|
| | Application | Error | None | 2016-02-28 14:22:09 | | System Restore | 8193: Failed to create restore point (Process = C:\Intel\Wireless\Setup.exe -s -wumode; Description = Intel® PROSet/Wireless Software; Error = 0x80070422).
|
| | Application | Error | None | 2016-02-28 14:23:08 | SYSTEM | Microsoft-Windows-WMI | 10: Event filter with query "select * from CIntelWLANEvent" could not be reactivated in namespace "//./ROOT/default" because of error 0x80041010. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Warning | None | 2016-02-28 14:24:23 | SYSTEM | Microsoft-Windows-WMI | 63: A provider, IntelWLANEventProvider, has been registered in the Windows Management Instrumentation namespace root\default to use the LocalSystem account. This account is privileged and the provider may cause a security violation if it does not correctly impersonate user requests.
|
| | Application | Warning | None | 2016-02-28 14:24:23 | SYSTEM | Microsoft-Windows-WMI | 63: A provider, IntelWLANEventProvider, has been registered in the Windows Management Instrumentation namespace root\default to use the LocalSystem account. This account is privileged and the provider may cause a security violation if it does not correctly impersonate user requests.
|
| | Application | Error | None | 2016-02-28 14:25:16 | | System Restore | 8193: Failed to create restore point (Process = C:\ProgramData\Package Cache\{e6d17d96-ddaa-476f-bb07-db601024ffb1}\Setup.exe Cache\{e6d17d96-ddaa-476f-bb07-db601024ffb1}\Setup.exe" -uninstall -quiet -burn.related.upgrade -burn.embedded BurnPipe.{88AC3813-C9FC-4B46-ACBF-F85C84407C14} {D79864A9-9481-43A0-95CF-DDA87BC827D8} 3220; Description = Intel® PROSet/Wireless Software; Error = 0x80070422).
|
| | Application | Warning | None | 2016-02-28 14:25:21 | SYSTEM | Microsoft-Windows-ApplicationExperienceInfrastructure | 1: The application (Intel Bluetooth Wireless High Speed, from vendor Intel) has the following problem: To function properly, Intel Bluetooth Wireless High Speed must be reinstalled after you upgrade Windows.
|
| | Application | Error | 2414 | 2016-02-28 14:34:37 | home | Microsoft-Windows-Immersive-Shell | 2486: App SymantecCorporation.NortonStudio_v68kp9n051hdp!App did not launch within its allotted time.
|
| | Application | Error | 101 | 2016-02-28 14:34:42 | | Application Hang | 1002: The program mmamain.exe version 1.0.0.114 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel. Process ID: 8bc Start Time: 01d171fa6cccebe4 Termination Time: 4294967295 Application Path: C:\Program Files\WindowsApps\SymantecCorporation.NortonStudio_1.0.0.114_x86__v68kp9n051hdp\mmamain.exe Report Id: b87891a7-dded-11e5-be7a-b4b676f504b9 Faulting package full name: SymantecCorporation.NortonStudio_1.0.0.114_x86__v68kp9n051hdp Faulting package-relative application ID: App
|
| | Application | Error | None | 2016-02-28 14:39:13 | | Customer Experience Improvement Program | 1008: A problem prevented Customer Experience Improvement Program data from being sent to Microsoft, (Error 80070005).
|
| | Security | Audit Success | 12288 | 2016-02-27 00:22:34 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13568 | 2016-02-27 00:22:35 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xb6b0
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:39 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13217 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13228 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13217 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13228 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:22:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:22:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:23:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:23:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:23:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:23:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-544 Account Domain: Builtin Old Account Name: Administrators New Account Name: Administrators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-545 Account Domain: Builtin Old Account Name: Users New Account Name: Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-546 Account Domain: Builtin Old Account Name: Guests New Account Name: Guests Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-558 Account Domain: Builtin Old Account Name: Performance Monitor Users New Account Name: Performance Monitor Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-559 Account Domain: Builtin Old Account Name: Performance Log Users New Account Name: Performance Log Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-562 Account Domain: Builtin Old Account Name: Distributed COM Users New Account Name: Distributed COM Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-568 Account Domain: Builtin Old Account Name: IIS_IUSRS New Account Name: IIS_IUSRS Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-573 Account Domain: Builtin Old Account Name: Event Log Readers New Account Name: Event Log Readers Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-580 Account Domain: Builtin Old Account Name: Remote Management Users New Account Name: Remote Management Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: Administrators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: Guests SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Monitor Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Log Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: Distributed COM Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: IIS_IUSRS SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: Event Log Readers SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:34 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Changed Attributes: SAM Account Name: Remote Management Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-500 Account Name: Administrator Account Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 7/26/2012 4:27:03 PM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-500 Account Name: Administrator Account Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 7/26/2012 4:27:03 PM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-501 Account Name: Guest Account Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-501 Account Name: Guest Account Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-513 Account Domain: WIN-9R4OEB365TQ Old Account Name: None New Account Name: None Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4737: A security-enabled global group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-21-4148812140-3900968213-992977265-513 Group Name: None Group Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:23:35 | | Microsoft-Windows-Security-Auditing | 4737: A security-enabled global group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-21-4148812140-3900968213-992977265-513 Group Name: None Group Domain: WIN-9R4OEB365TQ Changed Attributes: SAM Account Name: None SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:24:30 | | Microsoft-Windows-Security-Auditing | 4720: A user account was created. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Attributes: SAM Account Name: home Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 Allowed To Delegate To: - Old UAC Value: 0x0 New UAC Value: 0x15 User Account Control: %%2080 %%2082 %%2084 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:24:30 | | Microsoft-Windows-Security-Auditing | 4728: A member was added to a security-enabled global group. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: - Group: Security ID: S-1-5-21-4148812140-3900968213-992977265-513 Group Name: None Group Domain: samsung-home Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:24:31 | | Microsoft-Windows-Security-Auditing | 4722: A user account was enabled. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:24:31 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Changed Attributes: SAM Account Name: home Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x15 New UAC Value: 0x14 User Account Control: %%2048 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2016-02-27 00:24:31 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Changed Attributes: SAM Account Name: home Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x214 User Account Control: %%2089 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:24:31 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:24:32 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: - Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2016-02-27 00:24:32 | | Microsoft-Windows-Security-Auditing | 4733: A member was removed from a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2016-02-27 00:24:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:24:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2016-02-27 00:25:02 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2016-02-27 00:25:12 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:25:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:25:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:25:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x476d1 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:26:23 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: home Account Domain: samsung-home Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:26:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56a96 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:26:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x278 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:26:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56a96 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2016-02-27 00:30:09 | | Microsoft-Windows-Security-Auditing | 6406: Norton Internet Security registered to Windows Firewall to control filtering for the following: BootTimeRuleCategory, StealthRuleCategory, FirewallRuleCategory.
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:27 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:27 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:27 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:27 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:30:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-27 00:31:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:31:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:33:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:33:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:33:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:33:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:34:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:34:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 00:35:25 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:35:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abd7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:35:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abf5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:35:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abd7 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:35:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abf5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2016-02-27 00:35:30 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x56ae1 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:35:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13228 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:35:31 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13217 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:51:25 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: home Account Domain: samsung-home Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:51:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9dbe Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:51:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x650 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:51:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9dbe Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:42 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:42 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:42 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:42 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 00:51:46 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-27 00:52:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-3 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:52:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2ca Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 00:52:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2d9 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 00:52:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2ca Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 00:52:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2d9 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2016-02-27 00:52:20 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:52:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abf5 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:52:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x29abd7 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:52:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9de0 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-27 00:52:22 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2a9dbe Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2016-02-27 18:45:24 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: home Account Domain: samsung-home Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 18:45:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2deaaf Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 18:45:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x68c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:45:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2deaaf Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 18:45:41 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-27 18:47:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:47:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 18:49:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 18:49:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:49:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 18:49:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 18:49:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:49:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 18:54:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:54:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 18:58:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:58:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 18:59:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 18:59:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 19:00:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 19:00:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 19:01:25 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-4 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 19:01:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d60f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 19:01:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d620 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 19:01:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d60f Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-27 19:01:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d620 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2016-02-27 19:01:33 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x2dead1 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2016-02-27 19:01:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2d9 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-27 19:01:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-3 Account Name: DWM-3 Account Domain: Window Manager Logon ID: 0x2cb2ca Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2016-02-27 19:50:44 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: home Account Domain: samsung-home Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-27 19:50:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c743 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-27 19:50:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x13e4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 19:50:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c743 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:52 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:52 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:52 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:52 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-27 19:50:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-27 19:56:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 19:56:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-27 19:57:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-27 19:57:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 00:01:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:01:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 00:03:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:03:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 00:03:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:03:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:03:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-28 00:03:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 00:04:15 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-5 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:04:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-5 Account Name: DWM-5 Account Domain: Window Manager Logon ID: 0x77749b Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:04:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-5 Account Name: DWM-5 Account Domain: Window Manager Logon ID: 0x7774aa Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:04:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-5 Account Name: DWM-5 Account Domain: Window Manager Logon ID: 0x77749b Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2016-02-28 00:04:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-5 Account Name: DWM-5 Account Domain: Window Manager Logon ID: 0x7774aa Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12545 | 2016-02-28 00:04:22 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x65c765 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12545 | 2016-02-28 00:04:23 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d620 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2016-02-28 00:04:23 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-4 Account Name: DWM-4 Account Domain: Window Manager Logon ID: 0x64d60f Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:07:27 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: home Account Domain: samsung-home Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:07:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a88f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2016-02-28 00:07:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3c0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-9R4OEB365TQ Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:07:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a88f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:32 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:32 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:32 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:32 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:07:34 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: home Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-28 00:10:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:10:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-28 00:14:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:14:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:14:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:14:20 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-28 00:15:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 00:15:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-28 00:16:10 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 00:16:10 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 12288 | 2016-02-28 14:21:40 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x510 Name: C:\Windows\System32\svchost.exe Previous Time: 2016-02-27T17:20:59.022090600Z New Time: 2016-02-28T07:21:40.380798300Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2016-02-28 14:21:40 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x510 Name: C:\Windows\System32\svchost.exe Previous Time: 2016-02-28T07:21:40.398147900Z New Time: 2016-02-28T07:21:40.389000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12544 | 2016-02-28 14:22:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:22:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 14:22:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:22:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 14:25:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:25:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 14:25:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:25:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 14:25:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:25:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2016-02-28 14:32:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:32:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2016-02-28 14:34:07 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Administrator Target Account Domain: samsung-home
|
| | Security | Audit Success | 13824 | 2016-02-28 14:34:07 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-4148812140-3900968213-992977265-1001 Account Name: home Account Domain: samsung-home Logon ID: 0x79a8b1 Additional Information: Caller Workstation: WIN-9R4OEB365TQ Target Account Name: Guest Target Account Domain: samsung-home
|
| | Security | Audit Success | 12544 | 2016-02-28 14:34:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-9R4OEB365TQ$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2a8 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2016-02-28 14:34:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | System | Error | None | 2016-02-27 00:22:10 | | volmgr | 46: Crash dump initialization failed!
|
| | System | Warning | None | 2016-02-27 00:24:56 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Warning | None | 2016-02-27 00:24:56 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Warning | None | 2016-02-27 00:24:58 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Error | None | 2016-02-27 00:32:53 | home | DCOM | 10010: The server Microsoft.WindowsLive.Platform.Service.RemoteProcess did not register with DCOM within the required timeout.
|
| | System | Warning | 7 | 2016-02-27 00:35:23 | SYSTEM | Microsoft-Windows-Kernel-Processor-Power | 37: The speed of Hyper-V logical processor 1 is being limited by system firmware. The processor has been in this reduced performance state for 71 seconds since the last report.
|
| | System | Warning | 7 | 2016-02-27 00:35:23 | SYSTEM | Microsoft-Windows-Kernel-Processor-Power | 37: The speed of Hyper-V logical processor 0 is being limited by system firmware. The processor has been in this reduced performance state for 71 seconds since the last report.
|
| | System | Warning | 7 | 2016-02-27 00:35:23 | SYSTEM | Microsoft-Windows-Kernel-Processor-Power | 37: The speed of Hyper-V logical processor 2 is being limited by system firmware. The processor has been in this reduced performance state for 71 seconds since the last report.
|
| | System | Warning | 7 | 2016-02-27 00:35:23 | SYSTEM | Microsoft-Windows-Kernel-Processor-Power | 37: The speed of Hyper-V logical processor 3 is being limited by system firmware. The processor has been in this reduced performance state for 71 seconds since the last report.
|
| | System | Warning | 1014 | 2016-02-27 18:51:17 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name shasta-rrs.symantec.com timed out after none of the configured DNS servers responded.
|
| | System | Error | 1 | 2016-02-28 00:15:59 | SYSTEM | Microsoft-Windows-WindowsUpdateClient | 20: Installation Failure: Windows failed to install the following update with error 0x8007041d: Windows Update Setup Handler.
|
| | System | Warning | None | 2016-02-28 00:20:51 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: The requested name is valid, but no data of the requested type was found. (0x80072AFC)
|
| | System | Warning | None | 2016-02-28 00:20:53 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Warning | None | 2016-02-28 00:20:53 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 10002: WLAN Extensibility Module has stopped. Module Path: C:\windows\System32\IWMSSvc.dll
|
| | System | Warning | None | 2016-02-28 14:21:40 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 52: The time service has set the time with offset 50441 seconds.
|
| | System | Warning | None | 2016-02-28 14:23:25 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 10002: WLAN Extensibility Module has stopped. Module Path: C:\windows\System32\IWMSSvc.dll
|
| | |
|
| | B00 D00 F00: | Intel Ivy Bridge-MB - Host Bridge/DRAM Controller
|
| | |
|
| | Offset 000: | 86 80 54 01 06 00 90 20 09 00 00 06 00 00 00 00
|
| | Offset 010: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 E0 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 040: | 01 90 D1 FE 00 00 00 00 01 00 D1 FE 00 00 00 00
|
| | Offset 050: | 11 02 00 00 11 00 00 00 07 00 90 DF 01 00 00 DB
|
| | Offset 060: | 05 00 00 F8 00 00 00 00 01 80 D1 FE 00 00 00 00
|
| | Offset 070: | 00 00 00 7F 01 00 00 00 00 0C 00 FF 7F 00 00 00
|
| | Offset 080: | 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00
|
| | Offset 090: | 01 00 00 7F 01 00 00 00 01 00 50 9F 01 00 00 00
|
| | Offset 0A0: | 01 00 00 80 01 00 00 00 01 00 60 9F 01 00 00 00
|
| | Offset 0B0: | 01 00 A0 DB 01 00 80 DB 01 00 00 DB 01 00 A0 DF
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 09 00 0C 01 9B 61 00 E2 D0 00 E8 14 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 C8 0F 09 00 00 00 00 00
|
|
| | B00 D02 F00: | Intel Ivy Bridge-MB - Integrated Graphics Controller (MB GT2)
|
| | |
|
| | Offset 000: | 86 80 66 01 07 04 90 00 09 00 00 03 00 00 00 00
|
| | Offset 010: | 04 00 80 F7 00 00 00 00 0C 00 00 E0 00 00 00 00
|
| | Offset 020: | 01 F0 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 90 00 00 00 00 00 00 00 00 01 00 00
|
| | Offset 040: | 09 00 0C 01 9B 61 00 E2 D0 00 E8 14 00 00 00 00
|
| | Offset 050: | 11 02 00 00 11 00 00 00 00 00 00 00 01 00 A0 DB
|
| | Offset 060: | 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 05 D0 01 00 98 02 E0 FE 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 13 00 06 03 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 01 A4 22 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 80 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 00 00 09 00 18 60 C8 D9
|
|
| | B00 D14 F00: | Intel Panther Point PCH - USB 3.0 xHCI Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 31 1E 06 04 90 02 04 30 03 0C 00 00 00 00
|
| | Offset 010: | 04 00 D0 F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 70 00 00 00 00 00 00 00 00 01 00 00
|
| | Offset 040: | FD 07 0E 80 39 C2 03 80 00 00 00 00 00 00 00 00
|
| | Offset 050: | 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 30 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 01 80 C2 C1 08 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 05 00 B7 00 98 01 E0 FE 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 8F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 03 0C 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 01 00 00 00 0F 00 00 00 01 00 00 00 0F 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D16 F00: | Intel Panther Point PCH - Host Embedded Controller Interface 1 (HECI1) [C-1]
|
| | |
|
| | Offset 000: | 86 80 3A 1E 06 00 10 00 04 00 80 07 00 00 80 00
|
| | Offset 010: | 04 A0 D1 F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 50 00 00 00 00 00 00 00 10 01 00 00
|
| | Offset 040: | 45 02 00 1E 10 00 01 80 06 01 00 60 F0 17 00 10
|
| | Offset 050: | 01 8C 03 C8 08 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 00 00 00 00 00 00 00 00 00 00 00 00 05 00 80 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 C0
|
| | Offset 0C0: | FB A9 1A 76 70 A2 2E 0E BE 0B D1 CC 3C E0 FF 75
|
| | Offset 0D0: | AC 59 57 7A 53 28 4C 9A 43 89 97 A4 C8 FF 53 59
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | B00 D1A F00: | Intel Panther Point PCH - USB 2.0 EHCI Controller #2 [C-1]
|
| | |
|
| | Offset 000: | 86 80 2D 1E 06 00 90 02 04 20 03 0C 00 00 00 00
|
| | Offset 010: | 00 80 D1 F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 50 00 00 00 00 00 00 00 10 01 00 00
|
| | Offset 040: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 01 58 C2 C9 00 00 00 00 0A 98 A0 20 00 00 00 00
|
| | Offset 060: | 20 20 FF 07 00 00 00 00 01 00 00 00 00 20 00 C0
|
| | Offset 070: | 00 00 DF 3F 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 00 00 80 00 11 88 0C 93 30 0D 00 24 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 13 00 06 03 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 AA FF 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 04 F0 B4 DA
|
| | Offset 0F0: | 00 00 00 00 88 85 80 00 87 0F 05 08 08 17 5B 20
|
|
| | B00 D1B F00: | Intel Panther Point PCH - High Definition Audio Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 20 1E 06 00 10 00 04 00 03 04 10 00 00 00
|
| | Offset 010: | 04 C0 AF FE 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 50 00 00 00 00 00 00 00 16 01 00 00
|
| | Offset 040: | 01 00 00 45 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 01 60 42 C8 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 05 70 80 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 10 00 91 00 00 00 00 10 00 08 10 00 00 00 00 00
|
| | Offset 080: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 04 02 01 02 24 00 40 00 0C A3 82 10 00 33 02
|
| | Offset 0D0: | 00 0C A3 02 10 00 33 02 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1C F00: | Intel Panther Point PCH - PCI Express Port 1
|
| | |
|
| | Offset 000: | 86 80 10 1E 06 00 10 00 C4 00 04 06 10 00 81 00
|
| | Offset 010: | 00 00 00 00 00 00 00 00 00 01 01 00 F0 00 00 20
|
| | Offset 020: | C0 F7 C0 F7 F1 FF 01 00 00 00 00 00 00 00 00 00
|
| | Offset 030: | 00 00 00 00 40 00 00 00 00 00 00 00 10 01 00 00
|
| | Offset 040: | 10 80 42 01 00 80 00 00 00 00 10 00 12 3C 12 01
|
| | Offset 050: | 42 00 11 70 00 B2 04 00 00 00 40 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 02 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 05 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 0D A0 00 00 4D 14 06 C7 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 01 00 02 C8 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 01 02 0B 00 00 00 80 11 81 00 00 00 00
|
| | Offset 0E0: | 00 3F 00 00 00 00 00 00 01 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1C F03: | Intel Panther Point PCH - PCI Express Port 4
|
| | |
|
| | Offset 000: | 86 80 16 1E 07 00 10 00 C4 00 04 06 10 00 81 00
|
| | Offset 010: | 00 00 00 00 00 00 00 00 00 02 02 00 E0 E0 00 20
|
| | Offset 020: | F0 FF 00 00 01 F0 01 F0 00 00 00 00 00 00 00 00
|
| | Offset 030: | 00 00 00 00 40 00 00 00 00 00 00 00 13 04 00 00
|
| | Offset 040: | 10 80 42 01 00 80 00 00 00 00 10 00 12 3C 12 04
|
| | Offset 050: | 43 00 11 70 00 B2 1C 00 00 00 40 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 02 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 05 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 0D A0 00 00 4D 14 06 C7 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 01 00 02 C8 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 01 02 0B 00 00 00 80 11 81 00 00 00 00
|
| | Offset 0E0: | 00 03 00 00 00 00 00 00 01 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1D F00: | Intel Panther Point PCH - USB 2.0 EHCI Controller #1 [C-1]
|
| | |
|
| | Offset 000: | 86 80 26 1E 06 00 90 02 04 20 03 0C 00 00 00 00
|
| | Offset 010: | 00 70 D1 F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 50 00 00 00 00 00 00 00 17 01 00 00
|
| | Offset 040: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 01 58 C2 C9 00 80 00 00 0A 98 A0 20 00 00 00 00
|
| | Offset 060: | 20 20 FF 07 00 00 00 00 01 00 00 00 00 20 00 C0
|
| | Offset 070: | 00 00 DF 3F 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 00 00 80 00 11 88 0C 93 30 0D 00 24 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 13 00 06 03 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 AA FF 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 84 10 3E D9
|
| | Offset 0F0: | 00 00 00 00 88 85 80 00 87 0F 05 08 08 17 5B 20
|
|
| | B00 D1F F00: | Intel HM76 Chipset - LPC Interface Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 59 1E 07 00 10 02 04 00 01 06 00 00 80 00
|
| | Offset 010: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 E0 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 040: | 01 04 00 00 80 00 00 00 01 05 00 00 10 00 00 00
|
| | Offset 050: | F8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 80 80 80 D0 00 00 00 80 80 80 80 F8 F0 00 00
|
| | Offset 070: | 78 F0 78 F0 78 F0 78 F0 78 F0 78 F0 78 F0 78 F0
|
| | Offset 080: | 10 00 03 3C 4D 16 00 00 81 06 0C 00 01 0A 1C 00
|
| | Offset 090: | 01 0A 04 00 00 0F 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 04 0E 80 00 40 38 06 00 00 47 00 00 00 00 01 80
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 84 80 00 A0 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 33 22 11 00 67 45 00 00 CF FF 00 00 08 00 00 00
|
| | Offset 0E0: | 09 00 0C 10 00 00 00 00 13 06 64 06 00 00 00 00
|
| | Offset 0F0: | 01 C0 D1 FE 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1F F02: | Intel Panther Point-M PCH - SATA AHCI Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 03 1E 07 04 B0 02 04 01 06 01 00 00 00 00
|
| | Offset 010: | B1 F0 00 00 A1 F0 00 00 91 F0 00 00 81 F0 00 00
|
| | Offset 020: | 61 F0 00 00 00 60 D1 F7 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 80 00 00 00 00 00 00 00 00 02 00 00
|
| | Offset 040: | 00 80 00 80 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 01 A8 03 40 08 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 05 70 01 00 F8 00 E0 FE 00 00 00 00 00 00 00 00
|
| | Offset 090: | 60 3E 01 81 83 01 00 3E 08 42 5C 01 00 00 00 00
|
| | Offset 0A0: | E0 00 00 00 39 00 00 00 12 B0 10 00 48 00 00 00
|
| | Offset 0B0: | 13 00 06 03 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1F F03: | Intel Panther Point PCH - SMBus Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 22 1E 03 00 80 02 04 00 05 0C 00 00 00 00
|
| | Offset 010: | 04 50 D1 F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 41 F0 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 00 00 00 00 00 00 00 00 FF 03 00 00
|
| | Offset 040: | 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 03 04 04 00 00 00 08 08 00 00 00 00 00 00 00 00
|
| | Offset 070: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B00 D1F F06: | Intel Panther Point PCH - Thermal Management Controller [C-1]
|
| | |
|
| | Offset 000: | 86 80 24 1E 00 00 10 00 04 00 80 11 00 00 00 00
|
| | Offset 010: | 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 50 00 00 00 00 00 00 00 FF 03 00 00
|
| | Offset 040: | 05 00 A0 DF 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 01 00 23 00 08 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 87 0F 05 08 00 00 00 00
|
|
| | B01 D00 F00: | Intel Centrino Advanced-N 6235 AGN 2x2 HMC WiFi/Bluetooth Adapter
|
| | |
|
| | Offset 000: | 86 80 8E 08 06 04 10 00 24 00 80 02 10 00 00 00
|
| | Offset 010: | 04 E0 CF F7 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 020: | 00 00 00 00 00 00 00 00 00 00 00 00 86 80 60 40
|
| | Offset 030: | 00 00 00 00 C8 00 00 00 00 00 00 00 00 01 00 00
|
| | Offset 040: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 080: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 01 D0 23 C8 00 00 00 0D
|
| | Offset 0D0: | 05 E0 81 00 D8 02 E0 FE 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 10 00 01 00 C0 8E 00 10 00 08 19 00 11 EC 06 00
|
| | Offset 0F0: | 43 00 11 10 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | B02 D00 F00: | Realtek RTL8168/8111 PCI-E Gigabit Ethernet Adapter
|
| | |
|
| | Offset 000: | EC 10 68 81 07 04 10 00 06 00 00 02 10 00 00 00
|
| | Offset 010: | 01 E0 00 00 00 00 00 00 0C 40 00 F0 00 00 00 00
|
| | Offset 020: | 0C 00 00 F0 00 00 00 00 00 00 00 00 4D 14 06 C7
|
| | Offset 030: | 00 00 00 00 40 00 00 00 00 00 00 00 00 01 00 00
|
| | Offset 040: | 01 50 C3 FF 08 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 050: | 05 70 80 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 060: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 070: | 10 B0 02 02 C0 8C 90 05 00 50 19 00 11 7C 07 00
|
| | Offset 080: | 43 00 11 10 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 090: | 00 00 00 00 1F 00 00 00 10 00 00 00 00 00 00 00
|
| | Offset 0A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0B0: | 11 D0 03 80 04 00 00 00 04 08 00 00 00 00 00 00
|
| | Offset 0C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0D0: | 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 0F0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4000: | BB 8B 1C 00 65 64 18 0C 20 32 04 0A B4 58 00 00
|
| | Offset 4010: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 00
|
| | Offset 4020: | 05 00 10 00 26 20 20 20 01 00 0E 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4280: | 00 00 00 00 00 00 0C 00 00 00 00 00 44 00 00 00
|
| | Offset 4290: | 80 40 00 00 FF 98 00 00 60 18 D0 6C 58 02 00 00
|
| | Offset 42A0: | 01 10 00 00 00 82 F8 41 00 00 00 00 01 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4400: | BB 8B 1C 00 65 64 18 0C 20 42 04 0A B4 58 00 00
|
| | Offset 4410: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 00
|
| | Offset 4420: | 05 00 10 00 27 20 20 20 02 00 0E 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4680: | 00 00 00 00 00 00 0C 00 00 00 00 00 44 00 00 00
|
| | Offset 4690: | 80 40 00 00 FF 98 00 00 60 18 D0 6C 58 02 00 00
|
| | Offset 46A0: | 01 10 00 00 00 82 F8 41 00 00 00 00 01 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4800: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 4810: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 4A80: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 4A90: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 5000: | 24 00 00 00 10 00 60 00 08 00 60 00 00 00 60 00
|
| | Offset 5010: | 00 00 00 00 00 00 10 08 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 5880: | E7 71 91 CA 00 00 00 00 D0 DA E4 00 00 00 00 00
|
| | Offset 5890: | 1D CE F8 01 31 DD 27 01 00 00 00 00 00 00 00 00
|
| | Offset 58A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 58B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 58C0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 58D0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 58E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 58F0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 5900: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 5910: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 5920: | 00 00 00 00 08 00 00 00 BA 6F 35 1E D5 FF 16 03
|
| | Offset 5930: | 18 01 C0 00 00 00 10 00 03 10 0A 00 A4 89 94 31
|
| | Offset 5940: | 4B D6 9C 26 23 D2 77 00 00 07 00 00 00 00 00 00
|
| | Offset 5950: | 00 00 00 00 00 00 10 00 00 1A 01 E0 00 0C 08 00
|
| | Offset 5960: | F1 EF 83 F9 DE EC 31 CC 3D F7 0F 65 3D 83 91 D5
|
| | Offset 5970: | 20 F4 66 AE 20 F4 66 AE 35 00 00 00 35 00 00 00
|
| | Offset 5980: | 35 00 00 00 FB AB 3C 20 00 00 00 00 00 00 00 00
|
| | Offset 5990: | FF 00 00 00 FF 00 00 00 16 0D 07 00 00 12 69 05
|
| | Offset 59A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 59B0: | 80 03 00 80 94 14 14 18 70 01 00 80 94 14 14 18
|
| | Offset 59C0: | 00 00 34 88 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-0154: | Intel SNB/IVB/HSW/CRW/BDW/SKL/KBL MCHBAR @ FED10000h
|
| | |
|
| | Offset 5E00: | 06 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 5E10: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
| | PCI-8086-1E24: | Intel 5/6/7/8/9/10-series PCH TBARB @ DFA00000h
|
| | |
|
| | Offset 00: | 01 BA 00 E1 2B 3A 00 00 82 00 3C 00 00 00 C0 00
|
| | Offset 10: | 00 00 40 1A 87 DE 8C 80 00 00 E0 10 00 00 00 00
|
| | Offset 20: | 00 00 D4 07 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 30: | 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 80
|
| | Offset 40: | 01 02 00 FF 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 50: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 60: | 00 00 00 00 00 00 00 00 00 00 00 00 20 1B 16 05
|
| | Offset 70: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset 80: | 01 01 00 04 62 62 00 FF 00 00 00 00 00 00 00 00
|
| | Offset 90: | FA AE 74 1C 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset A0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset B0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset C0: | 01 01 00 00 00 00 00 FF 00 00 00 00 00 00 00 00
|
| | Offset D0: | 00 00 00 00 00 00 00 00 3D 00 C6 00 00 00 00 00
|
| | Offset E0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| | Offset F0: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|