| | | |
|
| | DLL File | Version | Description
|
| | aadtb.dll | 10.0.14393.321 | AAD Token Broker Helper Library
|
| | abovelockapphost.dll | 10.0.14393.206 | AboveLockAppHost
|
| | accessibilitycpl.dll | 10.0.14393.0 | Ease of access control panel
|
| | accountaccessor.dll | 10.0.14393.0 | Sync data model to access accounts
|
| | accountsrt.dll | 10.0.14393.0 | Accounts RT utilities for mail, contacts, calendar
|
| | acctres.dll | 10.0.14393.0 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 10.0.14393.0 | Access Control List Editor
|
| | aclui.dll | 10.0.14393.187 | Security Descriptor Editor
|
| | acppage.dll | 10.0.14393.0 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 10.0.14393.0 | Security and Maintenance
|
| | actioncentercpl.dll | 10.0.14393.447 | Security and Maintenance Control Panel
|
| | activationclient.dll | 10.0.14393.0 | Activation Client
|
| | activationmanager.dll | 10.0.14393.0 | Activation Manager
|
| | activeds.dll | 10.0.14393.0 | ADs Router Layer DLL
|
| | activesyncprovider.dll | 10.0.14393.0 | The engine that syncs ActiveSync accounts
|
| | actxprxy.dll | 10.0.14393.0 | ActiveX Interface Marshaling Library
|
| | addressparser.dll | 10.0.14393.187 | ADDRESSPARSER
|
| | admtmpl.dll | 10.0.14393.0 | Administrative Templates Extension
|
| | adprovider.dll | 10.0.14393.0 | adprovider DLL
|
| | adrclient.dll | 10.0.14393.0 | Microsoft® Access Denied Remediation Client
|
| | adsldp.dll | 10.0.14393.0 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 10.0.14393.0 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 10.0.14393.321 | ADs LDAP Provider DLL
|
| | adsnt.dll | 10.0.14393.0 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 10.0.14393.0 | Security Audit Schema DLL
|
| | advapi32.dll | 10.0.14393.0 | Advanced Windows 32 Base API
|
| | advapi32res.dll | 10.0.14393.0 | Advanced Windows 32 Base API
|
| | advpack.dll | 11.0.14393.0 | ADVPACK
|
| | aeevts.dll | 10.0.14393.0 | Application Experience Event Resources
|
| | amdave32.dll | 21.19.137.1 | Radeon AMD AVE Driver Component
|
| | amdgfxinfo32.dll | |
|
| | amdhcp32.dll | 21.19.137.1 | Universal Adapter for Adobe
|
| | amdlvr32.dll | 1.0.5.1 | LiquidVR SDK 1.0
|
| | amdmcl32.dll | 1.6.0.0 | Radeon MCL Universal Driver
|
| | amdpcom32.dll | 21.19.137.1 | Radeon PCOM Universal Driver
|
| | amdvlk32.dll | 1.0.21.0 | Vulkan driver, support for SI family and above
|
| | amfrt32.dll | 1.3.0.5 | Advanced Media Framework
|
| | amsi.dll | 10.0.14393.0 | Anti-Malware Scan Interface
|
| | amstream.dll | 10.0.14393.0 | DirectShow Runtime.
|
| | apds.dll | 10.0.14393.0 | Microsoft® Help Data Services Module
|
| | aphostclient.dll | 10.0.14393.0 | Accounts Host Service RPC Client
|
| | appcapture.dll | 10.0.14393.447 | Windows Runtime AppCapture DLL
|
| | appcontracts.dll | 10.0.14393.206 | Windows AppContracts API Server
|
| | appextension.dll | 10.0.14393.0 | AppExtension API
|
| | apphelp.dll | 10.0.14393.0 | Application Compatibility Client Library
|
| | apphlpdm.dll | 10.0.14393.0 | Application Compatibility Help Module
|
| | appidapi.dll | 10.0.14393.0 | Application Identity APIs Dll
|
| | appidpolicyengineapi.dll | 10.0.14393.0 | AppId Policy Engine API Module
|
| | applockercsp.dll | 10.0.14393.0 | AppLockerCSP
|
| | appmanagementconfiguration.dll | 10.0.14393.0 | Application Management Configuration
|
| | appmgmts.dll | 10.0.14393.0 | Software installation Service
|
| | appmgr.dll | 10.0.14393.0 | Software Installation Snapin Extenstion
|
| | appointmentactivation.dll | 10.0.14393.187 | DLL for AppointmentActivation
|
| | appointmentapis.dll | 10.0.14393.321 | DLL for CalendarRT
|
| | apprepapi.dll | 10.0.14393.321 | Application Reputation APIs Dll
|
| | apprepsync.dll | 10.0.14393.321 | AppRepSync Task
|
| | appvclientps.dll | 10.0.14393.0 | Microsoft Application Virtualization Client API Proxy Stub
|
| | appventsubsystems32.dll | 10.0.14393.0 | Client Virtualization Subsystems
|
| | appvsentinel.dll | 10.0.14393.0 | Microsoft Application Virtualization Client Sentinel DLL
|
| | appvterminator.dll | 10.0.14393.0 | Microsoft Application Virtualization Terminator
|
| | appxalluserstore.dll | 10.0.14393.0 | AppX All User Store DLL
|
| | appxapplicabilityengine.dll | 10.0.14393.0 | AppX Applicability Engine
|
| | appxdeploymentclient.dll | 10.0.14393.351 | AppX Deployment Client DLL
|
| | appxpackaging.dll | 10.0.14393.321 | Native Code Appx Packaging Library
|
| | appxsip.dll | 10.0.14393.0 | Appx Subject Interface Package
|
| | asferror.dll | 12.0.14393.0 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.6.1586.0 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 10.0.14393.447 | ASYCFILT.DLL
|
| | atiadlxx.dll | 21.19.137.1 | ADL
|
| | atiadlxy.dll | 21.19.137.1 | ADL
|
| | aticfx32.dll | 8.17.10.1484 | aticfxstub32.dll
|
| | atidxx32.dll | 8.17.10.690 | atidxxstub32.dll
|
| | atigktxx.dll | 21.19.137.1 | atigktxx.dll
|
| | atimpc32.dll | 21.19.137.1 | Radeon PCOM Universal Driver
|
| | atisamu32.dll | 21.19.137.1 | Radeon spu api dll
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.325 | ATL Module for Windows
|
| | atl110.dll | 11.0.50727.1 | ATL Module for Windows
|
| | atlthunk.dll | 10.0.14393.0 | atlthunk.dll
|
| | atmfd.dll | 5.1.2.250 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.250 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 10.0.14393.0 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 10.0.14393.0 | Audio Engine
|
| | audiokse.dll | 10.0.14393.0 | Audio Ks Endpoint
|
| | audioses.dll | 10.0.14393.447 | Audio Session
|
| | auditnativesnapin.dll | 10.0.14393.0 | Audit Policy Group Policy Editor Extension
|
| | auditpolcore.dll | 10.0.14393.0 | Audit Policy Program
|
| | auditpolicygpinterop.dll | 10.0.14393.0 | Audit Policy GP Module
|
| | auditpolmsg.dll | 10.0.14393.0 | Audit Policy MMC SnapIn Messages
|
| | authbroker.dll | 10.0.14393.321 | Web Authentication WinRT API
|
| | authbrokerui.dll | 10.0.14393.0 | AuthBroker UI
|
| | authext.dll | 10.0.14393.447 | Authentication Extensions
|
| | authfwcfg.dll | 10.0.14393.0 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 10.0.14393.0 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 10.0.14393.0 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 10.0.14393.0 | Wizard Framework
|
| | authui.dll | 10.0.14393.447 | Windows Authentication UI
|
| | authz.dll | 10.0.14393.0 | Authorization Framework
|
| | autoplay.dll | 10.0.14393.351 | AutoPlay Control Panel
|
| | avicap32.dll | 10.0.14393.0 | AVI Capture window class
|
| | avifil32.dll | 10.0.14393.0 | Microsoft AVI File support library
|
| | avrt.dll | 10.0.14393.0 | Multimedia Realtime Runtime
|
| | azroles.dll | 10.0.14393.0 | azroles Module
|
| | azroleui.dll | 10.0.14393.0 | Authorization Manager
|
| | azsqlext.dll | 10.0.14393.0 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | azuresettingsyncprovider.dll | 10.0.14393.321 | Azure Setting Sync Provider
|
| | backgroundmediapolicy.dll | 10.0.14393.206 | <d> Background Media Policy DLL
|
| | basecsp.dll | 10.0.14393.0 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 10.0.14393.0 | Battery Meter Helper DLL
|
| | bcastdvr.proxy.dll | 10.0.14393.0 | Broadcast DVR Proxy
|
| | bcastdvrhelper.dll | 10.0.14393.447 | Windows Runtime BcastDVRHelper DLL
|
| | bcd.dll | 10.0.14393.0 | BCD DLL
|
| | bcp47langs.dll | 10.0.14393.0 | BCP47 Language Classes
|
| | bcrypt.dll | 10.0.14393.0 | Windows Cryptographic Primitives Library
|
| | bcryptprimitives.dll | 10.0.14393.0 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 10.0.14393.0 | Bidispl DLL
|
| | bingmaps.dll | 10.0.14393.351 | Bing Map Control
|
| | bingonlineservices.dll | 10.0.14393.187 | Bing online services
|
| | biocredprov.dll | 10.0.14393.0 | WinBio Credential Provider
|
| | bitsperf.dll | 7.8.14393.0 | Perfmon Counter Access
|
| | bitsproxy.dll | 7.8.14393.0 | Background Intelligent Transfer Service Proxy
|
| | biwinrt.dll | 10.0.14393.206 | Windows Background Broker Infrastructure
|
| | bluetoothapis.dll | 10.0.14393.351 | Bluetooth Usermode Api host
|
| | bootvid.dll | 10.0.14393.0 | VGA Boot Driver
|
| | browcli.dll | 10.0.14393.0 | Browser Service Client DLL
|
| | browsersettingsync.dll | 10.0.14393.0 | Browser Setting Synchronization
|
| | browseui.dll | 10.0.14393.0 | Shell Browser UI Library
|
| | bthtelemetry.dll | 10.0.14393.0 | Bluetooth Telemetry Agent
|
| | btpanui.dll | 10.0.14393.0 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | c_g18030.dll | 10.0.14393.103 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_gsm7.dll | 10.0.14393.103 | GSM 7bit Code Page Translation DLL for SMS
|
| | c_is2022.dll | 10.0.14393.103 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 10.0.14393.0 | ISCII Code Page Translation DLL
|
| | cabapi.dll | 10.0.14393.0 | Mobile Cabinet Library
|
| | cabinet.dll | 5.0.1.1 | Microsoft® Cabinet File API
|
| | cabview.dll | 10.0.14393.0 | Cabinet File Viewer Shell Extension
|
| | callbuttons.dll | 10.0.14393.0 | Windows Runtime CallButtonsServer DLL
|
| | callbuttons.proxystub.dll | 10.0.14393.0 | Windows Runtime CallButtonsServer ProxyStub DLL
|
| | callhistoryclient.dll | 10.0.14393.0 | Client DLL for accessing CallHistory information
|
| | cameracaptureui.dll | 10.0.14393.0 | Microsoft® Windows® Operating System
|
| | capauthz.dll | 10.0.14393.0 | Capability Authorization APIs
|
| | capiprovider.dll | 10.0.14393.0 | capiprovider DLL
|
| | capisp.dll | 10.0.14393.0 | Sysprep cleanup dll for CAPI
|
| | castingshellext.dll | 10.0.14393.0 | Casting Shell Extensions
|
| | catsrv.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 10.0.14393.0 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.14393.0 | Microsoft CDO for Windows Library
|
| | cdp.dll | 10.0.14393.447 | Microsoft (R) CDP Client API
|
| | cdprt.dll | 10.0.14393.0 | Microsoft (R) CDP Client WinRT API
|
| | cemapi.dll | 10.0.14393.0 | CEMAPI
|
| | certca.dll | 10.0.14393.0 | Microsoft® Active Directory Certificate Services CA
|
| | certcli.dll | 10.0.14393.0 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 10.0.14393.0 | Cert Credential Provider
|
| | certenc.dll | 10.0.14393.0 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 10.0.14393.321 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 10.0.14393.0 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 10.0.14393.0 | Certificates snap-in
|
| | certpkicmdlet.dll | 10.0.14393.0 | Microsoft® PKI Client Cmdlets
|
| | certpoleng.dll | 10.0.14393.0 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.14393.0 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 10.0.14393.0 | Configuration Backend Interface
|
| | cfgmgr32.dll | 10.0.14393.0 | Configuration Manager DLL
|
| | cfmifs.dll | 10.0.14393.0 | FmIfs Engine
|
| | cfmifsproxy.dll | 10.0.14393.0 | Microsoft® FmIfs Proxy Library
|
| | chakra.dll | 11.0.14393.447 | Microsoft ® Chakra (Private)
|
| | chakradiag.dll | 11.0.14393.51 | Microsoft ® Chakra Diagnostics (Private)
|
| | chakrathunk.dll | 10.0.14393.51 | chakrathunk.dll
|
| | chartv.dll | 10.0.14393.447 | Chart View
|
| | chatapis.dll | 10.0.14393.321 | DLL for ChatRT
|
| | chxreadingstringime.dll | 10.0.14393.0 | CHxReadingStringIME
|
| | cic.dll | 10.0.14393.0 | CIC - MMC controls for Taskpad
|
| | clb.dll | 10.0.14393.0 | Column List Box
|
| | clbcatq.dll | 2001.12.10941.16384 | COM+ Configuration Catalog
|
| | clfsw32.dll | 10.0.14393.0 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 10.0.14393.0 | SQL Client Configuration Utility DLL
|
| | clipboardserver.dll | 10.0.14393.206 | Modern Clipboard API Server
|
| | clipc.dll | 10.0.14393.0 | Client Licensing Platform Client
|
| | cloudbackupsettings.dll | 10.0.14393.82 | Cloud Backup Setting Provider
|
| | cloudexperiencehostcommon.dll | 10.0.14393.321 | CloudExperienceHostCommon
|
| | cloudexperiencehostuser.dll | 10.0.14393.103 | CloudExperienceHost User Operations
|
| | clrhost.dll | 10.0.14393.0 | In Proc server for managed servers in the Windows Runtime
|
| | clusapi.dll | 10.0.14393.206 | Cluster API Library
|
| | cmcfg32.dll | 7.2.14393.0 | Microsoft Connection Manager Configuration Dll
|
| | cmdext.dll | 10.0.14393.0 | cmd.exe Extension DLL
|
| | cmdial32.dll | 7.2.14393.0 | Microsoft Connection Manager
|
| | cmifw.dll | 10.0.14393.351 | Windows Firewall rule configuration plug-in
|
| | cmlua.dll | 7.2.14393.0 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.14393.0 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.14393.0 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.14393.0 | Microsoft Connection Manager Utility Lib
|
| | cngcredui.dll | 10.0.14393.0 | Microsoft CNG CredUI Provider
|
| | cngprovider.dll | 10.0.14393.0 | cngprovider DLL
|
| | cnvfat.dll | 10.0.14393.0 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.10941.16384 | COM+
|
| | colorcnv.dll | 10.0.14393.0 | Windows Media Color Conversion
|
| | colorui.dll | 10.0.14393.0 | Microsoft Color Control Panel
|
| | combase.dll | 10.0.14393.351 | Microsoft COM for Windows
|
| | comcat.dll | 10.0.14393.0 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.14393.447 | User Experience Controls Library
|
| | comdlg32.dll | 10.0.14393.447 | Common Dialogs DLL
|
| | coml2.dll | 10.0.14393.0 | Microsoft COM for Windows
|
| | compobj.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | comppkgsup.dll | 10.0.14393.0 | Component Package Support DLL
|
| | compstui.dll | 10.0.14393.0 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.10941.16384 | COM+
|
| | comres.dll | 2001.12.10941.16384 | COM+ Resources
|
| | comsnap.dll | 2001.12.10941.16384 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.10941.16384 | COM+ Services
|
| | comuid.dll | 2001.12.10941.16384 | COM+ Explorer UI
|
| | configmanager2.dll | 10.0.14393.0 | ConfigManager
|
| | configureexpandedstorage.dll | 10.0.14393.321 | ConfigureExpandedStorage
|
| | connect.dll | 10.0.14393.0 | Get Connected Wizards
|
| | connectedaccountstate.dll | 10.0.14393.0 | ConnectedAccountState.dll
|
| | console.dll | 10.0.14393.0 | Control Panel Console Applet
|
| | contactactivation.dll | 10.0.14393.187 | DLL for ContactActivation
|
| | contactapis.dll | 10.0.14393.321 | DLL for ContactsRT
|
| | container.dll | 10.0.14393.82 | Windows Containers
|
| | coredpus.dll | 10.0.14393.0 | coredpus
|
| | coremessaging.dll | 10.0.14393.206 | Microsoft CoreMessaging Dll
|
| | coremmres.dll | 10.0.14393.0 | General Core Multimedia Resources
|
| | coreuicomponents.dll | |
|
| | cortana.persona.dll | 10.0.14393.0 | Cortana.Persona
|
| | cortanamapihelper.dll | 10.0.14393.0 | CortanaMapiHelper
|
| | cortanamapihelper.proxystub.dll | 10.0.14393.0 | CortanaMapiHelper.ProxyStub
|
| | cpfilters.dll | 10.0.14393.351 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credentialmigrationhandler.dll | 10.0.14393.0 | Credential Migration Handler
|
| | credprovdatamodel.dll | 10.0.14393.206 | Cred Prov Data Model
|
| | credprovhost.dll | 10.0.14393.206 | Credential Provider Framework Host
|
| | credprovs.dll | 10.0.14393.321 | Credential Providers
|
| | credprovslegacy.dll | 10.0.14393.206 | Credential Providers Legacy
|
| | credssp.dll | 10.0.14393.0 | Credential Delegation Security Package
|
| | credui.dll | 10.0.14393.0 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 10.0.14393.351 | Crypto API32
|
| | cryptbase.dll | 10.0.14393.0 | Base cryptographic API DLL
|
| | cryptdlg.dll | 10.0.14393.0 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 10.0.14393.0 | Cryptography Manager
|
| | cryptext.dll | 10.0.14393.0 | Crypto Shell Extensions
|
| | cryptnet.dll | 10.0.14393.0 | Crypto Network Related API
|
| | cryptngc.dll | 10.0.14393.206 | Microsoft Passport API
|
| | cryptowinrt.dll | 10.0.14393.206 | Crypto WinRT Library
|
| | cryptsp.dll | 10.0.14393.0 | Cryptographic Service Provider API
|
| | crypttpmeksvc.dll | 10.0.14393.0 | Cryptographic TPM Endorsement Key Services
|
| | cryptui.dll | 10.0.14393.0 | Microsoft Trust UI Provider
|
| | cryptuiwizard.dll | 10.0.14393.0 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 10.0.14393.0 | XML DigSig API
|
| | cscapi.dll | 10.0.14393.0 | Offline Files Win32 API
|
| | cscdll.dll | 10.0.14393.0 | Offline Files Temporary Shim
|
| | cscobj.dll | 10.0.14393.0 | In-proc COM object used by clients of CSC API
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 10.0.14393.206 | Microsoft D2D Library
|
| | d3d10.dll | 10.0.14393.0 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 10.0.14393.0 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 10.0.14393.0 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 10.0.14393.0 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 10.0.14393.0 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 10.0.14393.447 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 10.0.14393.351 | Direct3D 11 Runtime
|
| | d3d12.dll | 10.0.14393.351 | Direct3D 12 Runtime
|
| | d3d8.dll | 10.0.14393.447 | Microsoft Direct3D
|
| | d3d8thk.dll | 10.0.14393.0 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 10.0.14393.447 | Direct3D 9 Runtime
|
| | d3dcompiler_47.dll | 10.0.14393.351 | Direct3D HLSL Compiler
|
| | d3dim.dll | 10.0.14393.0 | Microsoft Direct3D
|
| | d3dim700.dll | 10.0.14393.0 | Microsoft Direct3D
|
| | d3dramp.dll | 10.0.14393.0 | Microsoft Direct3D
|
| | d3dx9_27.dll | 9.8.299.0 | Microsoft® DirectX for Windows®
|
| | d3dxof.dll | 10.0.14393.0 | DirectX Files DLL
|
| | dabapi.dll | 10.0.14393.0 | Desktop Activity Broker API
|
| | dafcdp.dll | 10.0.10586.0 | DAF CDP Provider
|
| | dafprintprovider.dll | 10.0.14393.0 | DAF Print Provider DLL
|
| | daotpcredentialprovider.dll | 10.0.14393.0 | DirectAccess One-Time Password Credential Provider
|
| | dataclen.dll | 10.0.14393.0 | Disk Space Cleaner for Windows
|
| | dataexchange.dll | 10.0.14393.206 | Data exchange
|
| | davclnt.dll | 10.0.14393.0 | Web DAV Client DLL
|
| | davhlpr.dll | 10.0.14393.0 | DAV Helper DLL
|
| | davsyncprovider.dll | 10.0.14393.0 | DAV sync engine for contacts, calendar
|
| | daxexec.dll | 10.0.14393.351 | daxexec
|
| | dbgcore.dll | 10.0.14321.1024 | Windows Core Debugging Helpers
|
| | dbgeng.dll | 10.0.14321.1024 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 10.0.14321.1024 | Windows Image Helper
|
| | dbgmodel.dll | 10.0.14321.1024 | Windows Debugger Data Model
|
| | dbnetlib.dll | 10.0.14393.0 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 10.0.14393.0 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 10.0.14393.0 | DCI Manager
|
| | dcomp.dll | 10.0.14393.0 | Microsoft DirectComposition Library
|
| | ddaclsys.dll | 10.0.14393.0 | SysPrep module for Resetting Data Drive ACL
|
| | ddoiproxy.dll | 10.0.14393.0 | DDOI Interface Proxy
|
| | ddores.dll | 10.0.14393.0 | Device Category information and resources
|
| | ddraw.dll | 10.0.14393.447 | Microsoft DirectDraw
|
| | ddrawex.dll | 10.0.14393.0 | Direct Draw Ex
|
| | defaultdevicemanager.dll | 10.0.14393.0 | Default Device Manager
|
| | defaultprinterprovider.dll | 10.0.14393.0 | Microsoft Windows Default Printer Provider
|
| | delegatorprovider.dll | 10.0.14393.103 | WMI PassThru Provider for Storage Management
|
| | deskadp.dll | 10.0.14393.0 | Advanced display adapter properties
|
| | deskmon.dll | 10.0.14393.0 | Advanced display monitor properties
|
| | detoured.dll | 21.19.137.1 | Marks process modified by Detours technology.
|
| | devdispitemprovider.dll | 10.0.14393.0 | DeviceItem inproc devquery subsystem
|
| | devenum.dll | 10.0.14393.206 | Device enumeration.
|
| | deviceaccess.dll | 10.0.14393.0 | Device Broker And Policy COM Server
|
| | deviceassociation.dll | 10.0.14393.82 | Device Association Client DLL
|
| | devicecenter.dll | 10.0.14393.0 | Device Center
|
| | devicecredential.dll | 10.0.14393.0 | Microsoft Companion Authenticator Client
|
| | devicedisplaystatusmanager.dll | 10.0.14393.0 | Device Display Status Manager
|
| | deviceflows.datamodel.dll | 10.0.14393.187 | DeviceFlows DataModel
|
| | devicengccredprov.dll | 10.0.14393.0 | Microsoft Companion Authenticator Credential Provider
|
| | devicepairing.dll | 10.0.14393.447 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 10.0.14393.0 | Device Pairing Folder
|
| | devicepairingproxy.dll | 10.0.14393.0 | Device Pairing Proxy Dll
|
| | devicesetupstatusprovider.dll | 10.0.14393.0 | Device Setup Status Provider Dll
|
| | deviceuxres.dll | 10.0.14393.0 | Windows Device User Experience Resource File
|
| | devmgr.dll | 10.0.14393.0 | Device Manager MMC Snapin
|
| | devobj.dll | 10.0.14393.0 | Device Information Set DLL
|
| | devrtl.dll | 10.0.14393.0 | Device Management Run Time Library
|
| | dfscli.dll | 10.0.14393.0 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 10.0.14393.0 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 10.0.14393.0 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 10.0.14393.0 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 10.0.14393.0 | DHCP Client Service
|
| | dhcpcore6.dll | 10.0.14393.351 | DHCPv6 Client
|
| | dhcpcsvc.dll | 10.0.14393.0 | DHCP Client Service
|
| | dhcpcsvc6.dll | 10.0.14393.0 | DHCPv6 Client
|
| | dhcpsapi.dll | 10.0.14393.0 | DHCP Server API Stub DLL
|
| | dialclient.dll | 10.0.14393.321 | DIAL DLL
|
| | dictationmanager.dll | 10.0.0.1 | Dictation Manager
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 10.0.14393.0 | DIMS Job DLL
|
| | dimsroam.dll | 10.0.14393.0 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 10.0.14393.0 | Microsoft DirectInput
|
| | dinput8.dll | 10.0.14393.0 | Microsoft DirectInput
|
| | direct2ddesktop.dll | 10.0.14393.0 | Microsoft Direct2D Desktop Components
|
| | directdb.dll | 10.0.14393.0 | Microsoft Direct Database API
|
| | directmanipulation.dll | 10.0.14393.0 | Microsoft Direct Manipulation Component
|
| | dismapi.dll | 10.0.14393.0 | DISM API Framework
|
| | dispex.dll | 5.812.10240.16384 | Microsoft ® DispEx
|
| | display.dll | 10.0.14393.0 | Display Control Panel
|
| | displaymanager.dll | 10.0.14393.206 | DisplayManager
|
| | dlnashext.dll | 10.0.14393.206 | DLNA Namespace DLL
|
| | dmband.dll | 10.0.14393.0 | Microsoft DirectMusic Band
|
| | dmcfgutils.dll | 10.0.14393.0 | dmcfgutils
|
| | dmcmnutils.dll | 10.0.14393.0 | dmcmnutils
|
| | dmcommandlineutils.dll | 10.0.14393.0 | dmcommandlineutils
|
| | dmcompos.dll | 10.0.14393.0 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 10.0.14393.0 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 10.0.14393.0 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 10.0.14393.0 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 10.0.14393.0 | Disk Management Snap-in Resources
|
| | dmenrollengine.dll | 10.0.14393.206 | Enroll Engine DLL
|
| | dmime.dll | 10.0.14393.0 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 10.0.14393.0 | Disk Management DCOM Interface Stub
|
| | dmiso8601utils.dll | 10.0.14393.0 | dmiso8601utils
|
| | dmloader.dll | 10.0.14393.0 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 10.0.14393.0 | TreeView OCX
|
| | dmoleaututils.dll | 10.0.14393.0 | dmoleaututils
|
| | dmprocessxmlfiltered.dll | 10.0.14393.0 | dmprocessxmlfiltered
|
| | dmpushproxy.dll | 10.0.14393.0 | dmpushproxy
|
| | dmscript.dll | 10.0.14393.0 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 10.0.14393.0 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 10.0.14393.0 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 10.0.14393.0 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 10.0.14393.0 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 10.0.14393.0 | Disk Management Snap-in Support Library
|
| | dmxmlhelputils.dll | 10.0.14393.0 | dmxmlhelputils
|
| | dnsapi.dll | 10.0.14393.206 | DNS Client API DLL
|
| | dnscmmc.dll | 10.0.14393.0 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 10.0.14393.0 | OLE DocFile Property Page
|
| | dolbydecmft.dll | 10.0.14393.351 | Media Foundation Dolby Digital Decoders
|
| | dot3api.dll | 10.0.14393.0 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 10.0.14393.0 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 10.0.14393.0 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 10.0.14393.0 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 10.0.14393.0 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 10.0.14393.0 | Dot3 Helper Class
|
| | dot3msm.dll | 10.0.14393.0 | 802.3 Media Specific Module
|
| | dot3ui.dll | 10.0.14393.0 | 802.3 Advanced UI
|
| | dpapi.dll | 10.0.14393.0 | Data Protection API
|
| | dpapiprovider.dll | 10.0.14393.0 | dpapiprovider DLL
|
| | dplayx.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpmodemx.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnaddr.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnathlp.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnet.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnhpast.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnhupnp.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpnlobby.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpwsockx.dll | 10.0.14393.0 | DirectPlay Stub
|
| | dpx.dll | 5.0.1.1 | Microsoft(R) Delta Package Expander
|
| | drprov.dll | 10.0.14393.0 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 10.0.14393.0 | Distributed Routing Table
|
| | drtprov.dll | 10.0.14393.0 | Distributed Routing Table Providers
|
| | drttransport.dll | 10.0.14393.0 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 10.0.14393.351 | Driver Store API
|
| | dsauth.dll | 10.0.14393.0 | DS Authorization for Services
|
| | dsccoreconfprov.dll | 6.2.9200.16384 | DSC
|
| | dsclient.dll | 10.0.14393.0 | Data Sharing Service Client DLL
|
| | dsdmo.dll | 10.0.14393.0 | DirectSound Effects
|
| | dskquota.dll | 10.0.14393.0 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 10.0.14393.0 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 10.0.14393.0 | DirectSound
|
| | dsparse.dll | 10.0.14393.0 | Active Directory Domain Services API
|
| | dsprop.dll | 10.0.14393.0 | Windows Active Directory Property Pages
|
| | dsquery.dll | 10.0.14393.0 | Directory Service Find
|
| | dsreg.dll | 10.0.14393.321 | AD/AAD User Device Registration
|
| | dsrole.dll | 10.0.14393.0 | DS Setup Client DLL
|
| | dssec.dll | 10.0.14393.0 | Directory Service Security UI
|
| | dssenh.dll | 10.0.14393.0 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsui.dll | 10.0.14393.0 | Device Setup UI Pages
|
| | dsuiext.dll | 10.0.14393.0 | Directory Service Common UI
|
| | dswave.dll | 10.0.14393.0 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 10.0.14393.0 | Detection and Sharing Status API
|
| | dui70.dll | 10.0.14393.0 | Windows DirectUI Engine
|
| | duser.dll | 10.0.14393.0 | Windows DirectUser Engine
|
| | dwmapi.dll | 10.0.14393.206 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 10.0.14393.351 | Microsoft DWM Core Library
|
| | dwrite.dll | 10.0.14393.351 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 10.0.14393.0 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 10.0.14393.0 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.14393.82 | Microsoft Windows Media Component Removal File.
|
| | dxptasksync.dll | 10.0.14393.0 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 11.0.14393.0 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 11.0.14393.447 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 10.0.14393.0 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 10.0.14393.187 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 10.0.14393.187 | Eap Peer Config
|
| | eappgnui.dll | 10.0.14393.187 | EAP Generic UI
|
| | eapphost.dll | 10.0.14393.187 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 10.0.14393.187 | Microsoft EAPHost Peer Client DLL
|
| | eapprovp.dll | 10.0.14393.0 | EAP extension DLL
|
| | eapsimextdesktop.dll | 10.0.14393.0 | EAP SIM EXT config dll
|
| | easwrt.dll | 10.0.14393.0 | Exchange ActiveSync Windows Runtime DLL
|
| | edgehtml.dll | 11.0.14393.447 | Microsoft Edge Web Platform
|
| | editbuffertesthook.dll | 10.0.14393.0 | "EditBufferTestHook.DYNLINK"
|
| | edpauditapi.dll | 10.0.14393.0 | EDP Audit API
|
| | edputil.dll | 10.0.14393.0 | EDP util
|
| | efsadu.dll | 10.0.14393.0 | File Encryption Utility
|
| | efsext.dll | 10.0.14393.447 | EFSEXT.DLL
|
| | efsutil.dll | 10.0.14393.0 | EFS Utility Library
|
| | efswrt.dll | 10.0.14393.321 | Storage Protection Windows Runtime DLL
|
| | ehstorapi.dll | 10.0.14393.0 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 10.0.14393.0 | Microsoft Enhanced Storage Password Manager
|
| | els.dll | 10.0.14393.0 | Event Viewer Snapin
|
| | elscore.dll | 10.0.14393.0 | Els Core Platform DLL
|
| | elshyph.dll | 10.0.14393.0 | ELS Hyphenation Service
|
| | elslad.dll | 10.0.14393.0 | ELS Language Detection
|
| | elstrans.dll | 10.0.14393.0 | ELS Transliteration Service
|
| | emailapis.dll | 10.0.14393.321 | DLL for EmailRT
|
| | embeddedmodesvcapi.dll | 10.0.14393.0 | Embedded Mode Service Client DLL
|
| | encapi.dll | 10.0.14393.105 | Encoder API
|
| | encdec.dll | 10.0.14393.0 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | encdump.dll | 5.0.1.1 | Media Foundation Crash Dump Encryption DLL
|
| | enrollmentapi.dll | 10.0.14393.0 | Legacy Phone Enrollment API BackCompat Shim
|
| | enterpriseresourcemanager.dll | 10.0.14393.0 | enterpriseresourcemanager DLL
|
| | eqossnap.dll | 10.0.14393.0 | EQoS Snapin extension
|
| | errordetails.dll | 10.0.14393.447 | Microsoft Windows operating system.
|
| | errordetailsupdate.dll | 10.0.14393.447 | Error Details Update Task
|
| | es.dll | 2001.12.10941.16384 | COM+
|
| | esdsip.dll | 10.0.14393.0 | Crypto SIP provider for signing and verifying .esd Electronic Software Distribution files
|
| | esent.dll | 10.0.14393.351 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 10.0.14393.0 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | esevss.dll | 10.0.14393.0 | Microsoft(R) ESENT shadow utilities
|
| | etwcoreuicomponentsresources.dll | 10.0.14393.0 | Microsoft CoreComponents UI ETW manifest Dll
|
| | etweseproviderresources.dll | 10.0.14393.0 | Microsoft ESE ETW
|
| | etwrundown.dll | 10.0.14393.0 | Etw Rundown Helper Library
|
| | eventcls.dll | 10.0.14393.0 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 10.0.14393.187 | Enhanced Video Renderer DLL
|
| | execmodelclient.dll | 10.0.14393.0 | ExecModelClient
|
| | execmodelproxy.dll | 10.0.14393.0 | ExecModelProxy
|
| | explorerframe.dll | 10.0.14393.447 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | exsmime.dll | 10.0.14393.187 | LExsmime
|
| | extrasxmlparser.dll | 10.0.14393.187 | Extras XML parser used to extract extension information from XML
|
| | f3ahvoas.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | familysafetyext.dll | 10.0.14393.0 | FamilySafety ChildAccount Extensions
|
| | faultrep.dll | 10.0.14393.0 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 10.0.14393.0 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 10.0.14393.0 | Bluetooth Provider Proxy Dll
|
| | fddevquery.dll | 10.0.14393.0 | Microsoft Windows Device Query Helper
|
| | fde.dll | 10.0.14393.0 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 10.0.14393.0 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 10.0.14393.0 | Pnp Provider Dll
|
| | fdprint.dll | 10.0.14393.0 | Function Discovery Print Provider Dll
|
| | fdproxy.dll | 10.0.14393.0 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 10.0.14393.0 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 10.0.14393.0 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 10.0.14393.0 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 10.0.14393.0 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 10.0.14393.0 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 10.0.14393.0 | Services and Shared Folders
|
| | findnetprinters.dll | 10.0.14393.206 | Find Network Printers COM Component
|
| | fingerprintcredential.dll | 10.0.14393.0 | WinBio Fingerprint Credential
|
| | firewallapi.dll | 10.0.14393.0 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 10.0.14393.0 | Windows Firewall Control Panel
|
| | fltlib.dll | 10.0.14393.0 | Filter Library
|
| | fm20.dll | 12.0.4518.1014 | Microsoft® Forms DLL
|
| | fm20enu.dll | 12.0.4518.1014 | Microsoft® Forms International DLL
|
| | fmifs.dll | 10.0.14393.0 | FM IFS Utility DLL
|
| | fms.dll | 10.0.14393.0 | Font Management Services
|
| | fontext.dll | 10.0.14393.447 | Windows Font Folder
|
| | fontglyphanimator.dll | 10.0.14393.0 | Font Glyph Animator
|
| | fontsub.dll | 10.0.14393.0 | Font Subsetting DLL
|
| | fphc.dll | 10.0.14393.0 | Filtering Platform Helper Class
|
| | framedyn.dll | 10.0.14393.0 | WMI SDK Provider Framework
|
| | framedynos.dll | 10.0.14393.0 | WMI SDK Provider Framework
|
| | frprov.dll | 10.0.14393.0 | Folder Redirection WMI Provider
|
| | fsclient.dll | 10.0.14393.447 | Frame Server Client DLL
|
| | fsutilext.dll | 10.0.14393.0 | FS Utility Extension DLL
|
| | fundisc.dll | 10.0.14393.0 | Function Discovery Dll
|
| | fwbase.dll | 10.0.14393.0 | Firewall Base DLL
|
| | fwcfg.dll | 10.0.14393.0 | Windows Firewall Configuration Helper
|
| | fwpolicyiomgr.dll | 10.0.14393.0 | FwPolicyIoMgr DLL
|
| | fwpuclnt.dll | 10.0.14393.0 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 10.0.14393.0 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 10.0.14393.0 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 10.0.14393.0 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 10.0.14393.0 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 10.0.14393.0 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 10.0.14393.0 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 10.0.14393.0 | Microsoft Fax Transport Provider
|
| | gamebarpresencewriter.proxy.dll | 10.0.14393.0 | GameBar Presence Writer Proxy
|
| | gamemanager32.dll | |
|
| | gamepanelexternalhook.dll | |
|
| | gameux.dll | 10.0.14393.447 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gamingtcui.dll | 10.0.14393.0 | Windows Gaming Internal CallableUI dll
|
| | gcdef.dll | 10.0.14393.0 | Game Controllers Default Sheets
|
| | gdi32.dll | 10.0.14393.206 | GDI Client DLL
|
| | gdi32full.dll | 10.0.14393.447 | GDI Client DLL
|
| | gdiplus.dll | 10.0.14393.321 | Microsoft GDI+
|
| | geocommon.dll | 10.0.14393.0 | Geocommon
|
| | geolocation.dll | 10.0.14393.351 | Geolocation Runtime DLL
|
| | getuname.dll | 10.0.14393.0 | Unicode name Dll for UCE
|
| | glmf32.dll | 10.0.14393.0 | OpenGL Metafiling DLL
|
| | globcollationhost.dll | 10.0.14393.447 | GlobCollationHost
|
| | globinputhost.dll | 10.0.14393.0 | Windows Globalization Extension API for Input
|
| | glu32.dll | 10.0.14393.0 | OpenGL Utility Library DLL
|
| | gmsaclient.dll | 10.0.14393.0 | "gmsaclient.DYNLINK"
|
| | gpapi.dll | 10.0.14393.0 | Group Policy Client API
|
| | gpedit.dll | 10.0.14393.0 | GPEdit
|
| | gpprefcl.dll | 10.0.14393.0 | Group Policy Preference Client
|
| | gpprnext.dll | 10.0.14393.0 | Group Policy Printer Extension
|
| | gpscript.dll | 10.0.14393.0 | Script Client Side Extension
|
| | gptext.dll | 10.0.14393.0 | GPTExt
|
| | hbaapi.dll | 10.0.14393.0 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 10.0.14393.0 | Security and Maintenance Providers
|
| | hdcphandler.dll | 10.0.14393.0 | Hdcp Handler DLL
|
| | helppaneproxy.dll | 10.0.14393.0 | Microsoft® Help Proxy
|
| | hevcdecoder.dll | 10.0.14393.351 | Windows H265 Video Decoder
|
| | hgcpl.dll | 10.0.14393.447 | HomeGroup Control Panel
|
| | hhsetup.dll | 10.0.14393.0 | Microsoft® HTML Help
|
| | hid.dll | 10.0.14393.0 | Hid User Library
|
| | hidserv.dll | 10.0.14393.0 | Human Interface Device Service
|
| | hlink.dll | 10.0.14393.0 | Microsoft Office 2000 component
|
| | hmkd.dll | 10.0.14393.0 | Windows HMAC Key Derivation API
|
| | hnetcfg.dll | 10.0.14393.0 | Home Networking Configuration Manager
|
| | hnetmon.dll | 10.0.14393.0 | Home Networking Monitor DLL
|
| | hrtfapo.dll | |
|
| | hsa-thunk.dll | |
|
| | httpapi.dll | 10.0.14393.0 | HTTP Protocol Stack API
|
| | htui.dll | 10.0.14393.0 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 10.0.14393.0 | Network Policy Server
|
| | iasacct.dll | 10.0.14393.0 | NPS Accounting Provider
|
| | iasads.dll | 10.0.14393.0 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 10.0.14393.0 | NPS Datastore server
|
| | iashlpr.dll | 10.0.14393.0 | NPS Surrogate Component
|
| | iasmigplugin.dll | 10.0.14393.0 | NPS Migration DLL
|
| | iasnap.dll | 10.0.14393.0 | NPS NAP Provider
|
| | iaspolcy.dll | 10.0.14393.0 | NPS Pipeline
|
| | iasrad.dll | 10.0.14393.0 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 10.0.14393.0 | NPS XML Datastore Access
|
| | iassam.dll | 10.0.14393.0 | NPS NT SAM Provider
|
| | iassdo.dll | 10.0.14393.0 | NPS SDO Component
|
| | iassvcs.dll | 10.0.14393.0 | NPS Services Component
|
| | iccvid.dll | 1.10.0.12 | Cinepak® Codec
|
| | icm32.dll | 10.0.14393.0 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 10.0.14393.0 | ICMP DLL
|
| | icmui.dll | 10.0.14393.0 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 10.0.14393.0 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 10.0.14393.0 | Internet Gateway Device properties
|
| | idctrls.dll | 10.0.14393.0 | Identity Controls
|
| | idndl.dll | 10.0.14393.0 | Downlevel DLL
|
| | idstore.dll | 10.0.14393.0 | Identity Store
|
| | ieadvpack.dll | 11.0.14393.0 | ADVPACK
|
| | ieapfltr.dll | 11.0.14393.447 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.14393.206 | IEAK branding
|
| | ieframe.dll | 11.0.14393.447 | Internet Browser
|
| | iepeers.dll | 11.0.14393.447 | Internet Explorer Peer Objects
|
| | ieproxy.dll | 11.0.14393.447 | IE ActiveX Interface Marshaling Library
|
| | iernonce.dll | 11.0.14393.82 | Extended RunOnce processing with UI
|
| | iertutil.dll | 11.0.14393.447 | Run time utility for Internet Explorer
|
| | iesetup.dll | 11.0.14393.82 | IOD Version Map
|
| | iesysprep.dll | 11.0.14393.0 | IE Sysprep Provider
|
| | ieui.dll | 11.0.14393.0 | Internet Explorer UI Engine
|
| | ifmon.dll | 10.0.14393.0 | IF Monitor DLL
|
| | ifsutil.dll | 10.0.14393.0 | IFS Utility DLL
|
| | ifsutilx.dll | 10.0.14393.0 | IFS Utility Extension DLL
|
| | imagehlp.dll | 10.0.14393.0 | Windows NT Image Helper
|
| | imageres.dll | 10.0.14393.0 | Windows Image Resource
|
| | imagesp1.dll | 10.0.14393.0 | Windows SP1 Image Resource
|
| | imapi.dll | 10.0.14393.0 | Image Mastering API
|
| | imapi2.dll | 10.0.14393.206 | Image Mastering API v2
|
| | imapi2fs.dll | 10.0.14393.0 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 11.0.14393.0 | IE plugin image decoder support DLL
|
| | imm32.dll | 10.0.14393.0 | Multi-User Windows IMM32 API Client DLL
|
| | indexeddbserver.dll | 10.0.14393.447 | IndexedDb host
|
| | inetcomm.dll | 10.0.14393.447 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 10.0.14393.0 | Microsoft MIB-II subagent
|
| | inetres.dll | 10.0.14393.0 | Microsoft Internet Messaging API Resources
|
| | inkanalysis.dll | 10.0.14393.0 | InkAnalysis DLL
|
| | inkanalysislegacycom.dll | 10.0.14393.0 | InkAnalysisLegacyCom DLL
|
| | inked.dll | 10.0.14393.0 | Microsoft Tablet PC InkEdit Control
|
| | inkobjcore.dll | 10.0.14393.0 | Microsoft Tablet PC Ink Platform Component
|
| | input.dll | 10.0.14393.447 | InputSetting DLL
|
| | inputinjectionbroker.dll | 10.0.14393.0 | Broker for WinRT input injection.
|
| | inputlocalemanager.dll | 10.0.14393.0 | "InputLocaleManager.DYNLINK"
|
| | inputservice.dll | 10.0.14393.206 | Microsoft Text InputService Dll
|
| | inputswitch.dll | 10.0.14393.0 | Microsoft Windows Input Switcher
|
| | inseng.dll | 11.0.14393.0 | Install engine
|
| | iologmsg.dll | 10.0.14393.0 | IO Logging DLL
|
| | ipeloggingdictationhelper.dll | 1.0.0.1 | IPE Logging Library Helper
|
| | iphlpapi.dll | 10.0.14393.0 | IP Helper API
|
| | iprop.dll | 10.0.14393.0 | OLE PropertySet Implementation
|
| | iprtprio.dll | 10.0.14393.0 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 10.0.14393.0 | IP Router Manager
|
| | ipsecsnp.dll | 10.0.14393.0 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 10.0.14393.0 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 10.0.14393.0 | IR32_32 WRAPPER DLL
|
| | ir32_32original.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_32original.dll | 4.51.16.3 | Intel Indeo® Video 4.5
|
| | ir41_qc.dll | 10.0.14393.0 | IR41_QC WRAPPER DLL
|
| | ir41_qcoriginal.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 10.0.14393.0 | IR41_QCX WRAPPER DLL
|
| | ir41_qcxoriginal.dll | 4.30.64.1 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 10.0.14393.0 | IR50_32 WRAPPER DLL
|
| | ir50_32original.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 10.0.14393.0 | IR50_QC WRAPPER DLL
|
| | ir50_qcoriginal.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 10.0.14393.0 | IR50_QCX WRAPPER DLL
|
| | ir50_qcxoriginal.dll | 5.0.64.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 10.0.14393.0 | Infrared Class Coinstaller
|
| | iri.dll | 10.0.14393.0 | iri
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 10.0.14393.0 | iSCSI Discovery api
|
| | iscsied.dll | 10.0.14393.0 | iSCSI Extension DLL
|
| | iscsium.dll | 10.0.14393.0 | iSCSI Discovery api
|
| | iscsiwmi.dll | 10.0.14393.351 | MS iSCSI Initiator WMI Provider
|
| | iscsiwmiv2.dll | 10.0.14393.0 | WMI Provider for iSCSI
|
| | itircl.dll | 10.0.14393.0 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 10.0.14393.0 | Microsoft® InfoTech Storage System Library
|
| | iyuv_32.dll | 10.0.14393.0 | Intel Indeo(R) Video YUV Codec
|
| | javascriptcollectionagent.dll | 11.0.14393.0 | JavaScript Performance Collection Agent
|
| | joinproviderol.dll | 10.0.14393.0 | Online Join Provider DLL
|
| | joinutil.dll | 10.0.14393.0 | Join Utility DLL
|
| | jpmapcontrol.dll | 10.0.14393.351 | Jupiter Map Control
|
| | jscript.dll | 5.812.10240.16384 | Microsoft ® JScript
|
| | jscript9.dll | 11.0.14393.447 | Microsoft ® JScript
|
| | jscript9diag.dll | 11.0.14393.447 | Microsoft ® JScript Diagnostics
|
| | jsproxy.dll | 11.0.14393.187 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 10.0.14393.0 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 10.0.14393.0 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 10.0.14393.0 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 10.0.14393.0 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 10.0.14393.0 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 10.0.14393.0 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 10.0.14393.0 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 10.0.14393.0 | Albania Keyboard Layout
|
| | kbdarme.dll | 10.0.14393.0 | Eastern Armenian Keyboard Layout
|
| | kbdarmph.dll | 10.0.14393.0 | Armenian Phonetic Keyboard Layout
|
| | kbdarmty.dll | 10.0.14393.0 | Armenian Typewriter Keyboard Layout
|
| | kbdarmw.dll | 10.0.14393.0 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 10.0.14393.0 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 10.0.14393.0 | Azeri-Latin Keyboard Layout
|
| | kbdazst.dll | 10.0.14393.0 | Azerbaijani (Standard) Keyboard Layout
|
| | kbdbash.dll | 10.0.14393.0 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 10.0.14393.0 | Belgian Keyboard Layout
|
| | kbdbene.dll | 10.0.14393.0 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 10.0.14393.0 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 10.0.14393.0 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 10.0.14393.0 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 10.0.14393.0 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 10.0.14393.0 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 10.0.14393.0 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbug.dll | 10.0.14393.0 | Buginese Keyboard Layout
|
| | kbdbulg.dll | 10.0.14393.0 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 10.0.14393.0 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 10.0.14393.0 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcher.dll | 10.0.14393.0 | Cherokee Nation Keyboard Layout
|
| | kbdcherp.dll | 10.0.14393.0 | Cherokee Phonetic Keyboard Layout
|
| | kbdcr.dll | 10.0.14393.0 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 10.0.14393.0 | Czech Keyboard Layout
|
| | kbdcz1.dll | 10.0.14393.0 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 10.0.14393.0 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 10.0.14393.0 | Danish Keyboard Layout
|
| | kbddiv1.dll | 10.0.14393.0 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 10.0.14393.0 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 10.0.14393.0 | Dvorak US English Keyboard Layout
|
| | kbddzo.dll | 10.0.14393.0 | Dzongkha Keyboard Layout
|
| | kbdes.dll | 10.0.14393.0 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 10.0.14393.0 | Estonia Keyboard Layout
|
| | kbdfa.dll | 10.0.14393.0 | Persian Keyboard Layout
|
| | kbdfar.dll | 10.0.14393.0 | Persian Standard Keyboard Layout
|
| | kbdfc.dll | 10.0.14393.0 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 10.0.14393.0 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 10.0.14393.0 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 10.0.14393.0 | Færoese Keyboard Layout
|
| | kbdfr.dll | 10.0.14393.0 | French Keyboard Layout
|
| | kbdfthrk.dll | 10.0.14393.0 | Futhark Keyboard Layout
|
| | kbdgae.dll | 10.0.14393.0 | Scottish Gaelic (United Kingdom) Keyboard Layout
|
| | kbdgeo.dll | 10.0.14393.0 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 10.0.14393.0 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeome.dll | 10.0.14393.0 | Georgian (MES) Keyboard Layout
|
| | kbdgeooa.dll | 10.0.14393.0 | Georgian (Old Alphabets) Keyboard Layout
|
| | kbdgeoqw.dll | 10.0.14393.0 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 10.0.14393.0 | Greek_Latin Keyboard Layout
|
| | kbdgn.dll | 10.0.14393.0 | Guarani Keyboard Layout
|
| | kbdgr.dll | 10.0.14393.0 | German Keyboard Layout
|
| | kbdgr1.dll | 10.0.14393.0 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 10.0.14393.0 | Greenlandic Keyboard Layout
|
| | kbdgthc.dll | 10.0.14393.0 | Gothic Keyboard Layout
|
| | kbdhau.dll | 10.0.14393.0 | Hausa Keyboard Layout
|
| | kbdhaw.dll | 10.0.14393.0 | Hawaiian Keyboard Layout
|
| | kbdhe.dll | 10.0.14393.0 | Greek Keyboard Layout
|
| | kbdhe220.dll | 10.0.14393.0 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 10.0.14393.0 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 10.0.14393.0 | KBDHEB Keyboard Layout
|
| | kbdhebl3.dll | 10.0.14393.0 | Hebrew Standard Keyboard Layout
|
| | kbdhela2.dll | 10.0.14393.0 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 10.0.14393.0 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 10.0.14393.0 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 10.0.14393.0 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 10.0.14393.0 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 10.0.14393.0 | Igbo Keyboard Layout
|
| | kbdic.dll | 10.0.14393.0 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 10.0.14393.0 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 10.0.14393.0 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 10.0.14393.0 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 10.0.14393.0 | Bengali Keyboard Layout
|
| | kbdindev.dll | 10.0.14393.0 | Devanagari Keyboard Layout
|
| | kbdinen.dll | 10.0.14393.0 | English (India) Keyboard Layout
|
| | kbdinguj.dll | 10.0.14393.0 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 10.0.14393.0 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 10.0.14393.0 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 10.0.14393.0 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 10.0.14393.0 | Marathi Keyboard Layout
|
| | kbdinori.dll | 10.0.14393.0 | Odia Keyboard Layout
|
| | kbdinpun.dll | 10.0.14393.0 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 10.0.14393.0 | Tamil Keyboard Layout
|
| | kbdintel.dll | 10.0.14393.0 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 10.0.14393.0 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 10.0.14393.0 | Irish Keyboard Layout
|
| | kbdit.dll | 10.0.14393.0 | Italian Keyboard Layout
|
| | kbdit142.dll | 10.0.14393.0 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 10.0.14393.0 | Inuktitut Latin Keyboard Layout
|
| | kbdjav.dll | 10.0.14393.0 | Javanese Keyboard Layout
|
| | kbdjpn.dll | 10.0.14393.0 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 10.0.14393.0 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 10.0.14393.0 | Cambodian Standard Keyboard Layout
|
| | kbdkni.dll | 10.0.14393.0 | Khmer (NIDA) Keyboard Layout
|
| | kbdkor.dll | 10.0.14393.0 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkurd.dll | 10.0.14393.0 | Central Kurdish Keyboard Layout
|
| | kbdkyr.dll | 10.0.14393.0 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 10.0.14393.0 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 10.0.14393.0 | Lao Standard Keyboard Layout
|
| | kbdlisub.dll | 10.0.14393.0 | Lisu Basic Keyboard Layout
|
| | kbdlisus.dll | 10.0.14393.0 | Lisu Standard Keyboard Layout
|
| | kbdlk41a.dll | 10.0.14393.0 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 10.0.14393.0 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 10.0.14393.0 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 10.0.14393.0 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 10.0.14393.0 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 10.0.14393.0 | Latvia-QWERTY Keyboard Layout
|
| | kbdlvst.dll | 10.0.14393.0 | Latvian (Standard) Keyboard Layout
|
| | kbdmac.dll | 10.0.14393.0 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 10.0.14393.0 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 10.0.14393.0 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 10.0.14393.0 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 10.0.14393.0 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 10.0.14393.0 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 10.0.14393.0 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdmonst.dll | 10.0.14393.0 | Traditional Mongolian (Standard) Keyboard Layout
|
| | kbdmyan.dll | 10.0.14393.0 | Myanmar Keyboard Layout
|
| | kbdne.dll | 10.0.14393.0 | Dutch Keyboard Layout
|
| | kbdnec.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 10.0.14393.0 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 10.0.14393.0 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 10.0.14393.0 | Nepali Keyboard Layout
|
| | kbdnko.dll | 10.0.14393.0 | N'Ko Keyboard Layout
|
| | kbdno.dll | 10.0.14393.0 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 10.0.14393.0 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 10.0.14393.0 | Sesotho sa Leboa Keyboard Layout
|
| | kbdntl.dll | 10.0.14393.0 | New Tai Leu Keyboard Layout
|
| | kbdogham.dll | 10.0.14393.0 | Ogham Keyboard Layout
|
| | kbdolch.dll | 10.0.14393.0 | Ol Chiki Keyboard Layout
|
| | kbdoldit.dll | 10.0.14393.0 | Old Italic Keyboard Layout
|
| | kbdosm.dll | 10.0.14393.0 | Osmanya Keyboard Layout
|
| | kbdpash.dll | 10.0.14393.0 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdphags.dll | 10.0.14393.0 | Phags-pa Keyboard Layout
|
| | kbdpl.dll | 10.0.14393.0 | Polish Keyboard Layout
|
| | kbdpl1.dll | 10.0.14393.0 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 10.0.14393.0 | Portuguese Keyboard Layout
|
| | kbdro.dll | 10.0.14393.0 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 10.0.14393.0 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 10.0.14393.0 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 10.0.14393.0 | Russian Keyboard Layout
|
| | kbdru1.dll | 10.0.14393.0 | Russia(Typewriter) Keyboard Layout
|
| | kbdrum.dll | 10.0.14393.0 | Russian - Mnemonic Keyboard Layout
|
| | kbdsf.dll | 10.0.14393.0 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 10.0.14393.0 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 10.0.14393.0 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 10.0.14393.0 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 10.0.14393.0 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 10.0.14393.0 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 10.0.14393.0 | Sinhala Keyboard Layout
|
| | kbdsora.dll | 10.0.14393.0 | Sora Keyboard Layout
|
| | kbdsorex.dll | 10.0.14393.0 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 10.0.14393.0 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 10.0.14393.0 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 10.0.14393.0 | Spanish Keyboard Layout
|
| | kbdsw.dll | 10.0.14393.0 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 10.0.14393.0 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 10.0.14393.0 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 10.0.14393.0 | Syriac Phoenetic Keyboard Layout
|
| | kbdtaile.dll | 10.0.14393.0 | Tai Le Keyboard Layout
|
| | kbdtajik.dll | 10.0.14393.0 | Tajik Keyboard Layout
|
| | kbdtat.dll | 10.0.14393.0 | Tatar (Legacy) Keyboard Layout
|
| | kbdth0.dll | 10.0.14393.0 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 10.0.14393.0 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 10.0.14393.0 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 10.0.14393.0 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtifi.dll | 10.0.14393.0 | Tifinagh (Basic) Keyboard Layout
|
| | kbdtifi2.dll | 10.0.14393.0 | Tifinagh (Extended) Keyboard Layout
|
| | kbdtiprc.dll | 10.0.14393.0 | Tibetan (PRC) Keyboard Layout
|
| | kbdtiprd.dll | 10.0.14393.0 | Tibetan (PRC) - Updated Keyboard Layout
|
| | kbdtt102.dll | 10.0.14393.0 | Tatar Keyboard Layout
|
| | kbdtuf.dll | 10.0.14393.0 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 10.0.14393.0 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 10.0.14393.0 | Turkmen Keyboard Layout
|
| | kbdtzm.dll | 10.0.14393.0 | Central Atlas Tamazight Keyboard Layout
|
| | kbdughr.dll | 10.0.14393.0 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 10.0.14393.0 | Uyghur Keyboard Layout
|
| | kbduk.dll | 10.0.14393.0 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 10.0.14393.0 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 10.0.14393.0 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 10.0.14393.0 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 10.0.14393.0 | Urdu Keyboard Layout
|
| | kbdus.dll | 10.0.14393.0 | United States Keyboard Layout
|
| | kbdusa.dll | 10.0.14393.0 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 10.0.14393.0 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 10.0.14393.0 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 10.0.14393.0 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 10.0.14393.0 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 10.0.14393.0 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 10.0.14393.0 | Wolof Keyboard Layout
|
| | kbdyak.dll | 10.0.14393.0 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 10.0.14393.0 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 10.0.14393.0 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 10.0.14393.0 | Serbian (Latin) Keyboard Layout
|
| | kerbclientshared.dll | 10.0.14393.0 | Kerberos Client Shared Functionality
|
| | kerberos.dll | 10.0.14393.187 | Kerberos Security Package
|
| | kernel.appcore.dll | 10.0.14393.0 | AppModel API Host
|
| | kernel32.dll | 10.0.14393.0 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 10.0.14393.321 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 10.0.14393.0 | CNG Key Isolation Service
|
| | keymgr.dll | 10.0.14393.0 | Stored User Names and Passwords
|
| | ksuser.dll | 10.0.14393.0 | User CSA Library
|
| | ktmw32.dll | 10.0.14393.0 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 10.0.14393.0 | Policy Storage dll
|
| | l2nacp.dll | 10.0.14393.0 | Windows Onex Credential Provider
|
| | l2sechc.dll | 10.0.14393.0 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.14393.0 | Windows Media Logagent Proxy
|
| | licensemanager.dll | 10.0.14393.206 | LicenseManager
|
| | licensemanagerapi.dll | 10.0.14393.206 | "LicenseManagerApi.DYNLINK"
|
| | licensingdiagspp.dll | 10.0.14393.0 | Licensing Diagnostics SPP Plugin
|
| | licmgr10.dll | 11.0.14393.0 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 10.0.14393.0 | Windows Volume Tracking
|
| | loadperf.dll | 10.0.14393.0 | Load & Unload Performance Counters
|
| | localsec.dll | 10.0.14393.0 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 10.0.14393.0 | Microsoft Windows Location API
|
| | locationframeworkinternalps.dll | 10.0.14393.0 | Windows Geolocation Framework Internal PS
|
| | locationframeworkps.dll | 10.0.14393.0 | Windows Geolocation Framework PS
|
| | lockappbroker.dll | 10.0.14393.447 | Windows Lock App Broker DLL
|
| | loghours.dll | 10.0.14393.0 | Schedule Dialog
|
| | logoncli.dll | 10.0.14393.0 | Net Logon Client DLL
|
| | logoncontroller.dll | 10.0.14393.206 | Logon UX Controller
|
| | lpk.dll | 10.0.14393.0 | Language Pack
|
| | lsmproxy.dll | 10.0.14393.0 | LSM interfaces proxy Dll
|
| | luainstall.dll | 10.0.14393.0 | Lua manifest install
|
| | lz32.dll | 5.0.1.1 | LZ Expand/Compress API DLL
|
| | magnification.dll | 10.0.14393.0 | Microsoft Magnification API
|
| | mantle32.dll | 21.19.137.1 | Mantle loader
|
| | mantleaxl32.dll | 21.19.137.1 | Mantle extension library
|
| | mapconfiguration.dll | 10.0.14393.187 | MapConfiguration
|
| | mapcontrolcore.dll | 10.0.14393.351 | Map Control Core
|
| | mapcontrolstringsres.dll | 10.0.14393.187 | Map control resource strings
|
| | mapgeocoder.dll | 10.0.14393.187 | Maps Geocoder
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | maprouter.dll | 10.0.14393.187 | Maps Router
|
| | mapsbtsvc.dll | 10.0.14393.187 | Maps Background Transfer Service
|
| | mbaeapi.dll | 10.0.14393.0 | Mobile Broadband Account Experience API
|
| | mbaeapipublic.dll | 10.0.14393.206 | Mobile Broadband Account API
|
| | mbsmsapi.dll | 10.0.14393.206 | Microsoft Windows Mobile Broadband SMS API
|
| | mbussdapi.dll | 10.0.14393.0 | Microsoft Windows Mobile Broadband USSD API
|
| | mccsengineshared.dll | 10.0.14393.0 | Utilies shared among OneSync engines
|
| | mciavi32.dll | 10.0.14393.0 | Video For Windows MCI driver
|
| | mcicda.dll | 10.0.14393.0 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 10.0.14393.0 | DirectShow MCI Driver
|
| | mciseq.dll | 10.0.14393.0 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 10.0.14393.0 | MCI driver for waveform audio
|
| | mcrecvsrc.dll | 10.0.14393.321 | Miracast Media Foundation Source DLL
|
| | mdminst.dll | 10.0.14393.0 | Modem Class Installer
|
| | mdmregistration.dll | 10.0.14393.0 | MDM Registration DLL
|
| | messagingdatamodel2.dll | 10.0.14393.0 | MessagingDataModel2
|
| | mf.dll | 10.0.14393.187 | Media Foundation DLL
|
| | mf3216.dll | 10.0.14393.0 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 10.0.14393.0 | Media Foundation AAC Encoder
|
| | mfasfsrcsnk.dll | 10.0.14393.0 | Media Foundation ASF Source and Sink DLL
|
| | mfaudiocnv.dll | 10.0.14393.0 | Media Foundation Audio Converter DLL
|
| | mfc100.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc100chs.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100cht.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100deu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100enu.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100esn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100fra.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100ita.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100jpn.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100kor.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100rus.dll | 10.0.40219.325 | MFC Language Specific Resources
|
| | mfc100u.dll | 10.0.40219.325 | MFCDLL Shared Library - Retail Version
|
| | mfc110.dll | 11.0.50727.1 | MFCDLL Shared Library - Retail Version
|
| | mfc110chs.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110cht.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110deu.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110enu.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110esn.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110fra.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110ita.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110jpn.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110kor.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110rus.dll | 11.0.50727.1 | MFC Language Specific Resources
|
| | mfc110u.dll | 11.0.50727.1 | MFCDLL Shared Library - Retail Version
|
| | mfc120.dll | 12.0.21005.1 | MFCDLL Shared Library - Retail Version
|
| | mfc120chs.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120cht.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120deu.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120enu.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120esn.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120fra.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120ita.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120jpn.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120kor.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120rus.dll | 12.0.21005.1 | MFC Language Specific Resources
|
| | mfc120u.dll | 12.0.21005.1 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfcaptureengine.dll | 10.0.14393.0 | Media Foundation CaptureEngine DLL
|
| | mfcm100.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.325 | MFC Managed Library - Retail Version
|
| | mfcm110.dll | 11.0.50727.1 | MFC Managed Library - Retail Version
|
| | mfcm110u.dll | 11.0.50727.1 | MFC Managed Library - Retail Version
|
| | mfcm120.dll | 12.0.21005.1 | MFC Managed Library - Retail Version
|
| | mfcm120u.dll | 12.0.21005.1 | MFC Managed Library - Retail Version
|
| | mfcore.dll | 10.0.14393.447 | Media Foundation Core DLL
|
| | mfcsubs.dll | 2001.12.10941.16384 | COM+
|
| | mfds.dll | 10.0.14393.0 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 10.0.14393.0 | Media Foundation DV Decoder
|
| | mferror.dll | 10.0.14393.0 | Media Foundation Error DLL
|
| | mfh263enc.dll | 10.0.14393.0 | Media Foundation h263 Encoder
|
| | mfh264enc.dll | 10.0.14393.0 | Media Foundation H264 Encoder
|
| | mfh265enc.dll | 10.0.14393.0 | Media Foundation H265 Encoder
|
| | mfksproxy.dll | 10.0.14393.351 | Dshow MF Bridge DLL DLL
|
| | mfmediaengine.dll | 10.0.14393.447 | Media Foundation Media Engine DLL
|
| | mfmjpegdec.dll | 10.0.14393.0 | Media Foundation MJPEG Decoder
|
| | mfmkvsrcsnk.dll | 10.0.14393.0 | Media Foundation MKV Media Source and Sink DLL
|
| | mfmp4srcsnk.dll | 10.0.14393.351 | Media Foundation MPEG4 Source and Sink DLL
|
| | mfmpeg2srcsnk.dll | 10.0.14393.206 | Media Foundation MPEG2 Source and Sink DLL
|
| | mfnetcore.dll | 10.0.14393.321 | Media Foundation Net Core DLL
|
| | mfnetsrc.dll | 10.0.14393.321 | Media Foundation Net Source DLL
|
| | mfperfhelper.dll | 10.0.14393.0 | MFPerf DLL
|
| | mfplat.dll | 10.0.14393.351 | Media Foundation Platform DLL
|
| | mfplay.dll | 10.0.14393.0 | Media Foundation Playback API DLL
|
| | mfps.dll | 10.0.14393.105 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 10.0.14393.206 | Media Foundation ReadWrite DLL
|
| | mfsensorgroup.dll | 10.0.14393.447 | Media Foundation Sensor Group DLL
|
| | mfsrcsnk.dll | 10.0.14393.82 | Media Foundation Source and Sink DLL
|
| | mfsvr.dll | 10.0.14393.447 | Media Foundation Simple Video Renderer DLL
|
| | mftranscode.dll | 10.0.14393.0 | Media Foundation Transcode DLL
|
| | mfvdsp.dll | 10.0.14393.0 | Windows Media Foundation Video DSP Components
|
| | mfvfw.dll | 10.0.14393.0 | MF VFW MFT
|
| | mfwmaaec.dll | 10.0.14393.0 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 10.0.14393.0 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | mi.dll | 10.0.14393.0 | Management Infrastructure
|
| | mibincodec.dll | 10.0.14393.0 | Management Infrastructure binary codec component
|
| | microsoft.management.infrastructure.native.unmanaged.dll | 10.0.14393.0 | Microsoft.Management.Infrastructure.Native.Unmanaged.dll
|
| | microsoft.uev.appagent.dll | 10.0.14393.0 | Microsoft.Uev.AppAgent DLL
|
| | microsoft.uev.office2010customactions.dll | 10.0.14393.0 | Microsoft.Uev.Office2010CustomActions DLL
|
| | microsoft.uev.office2013customactions.dll | 10.0.14393.0 | Microsoft.Uev.Office2013CustomActions DLL
|
| | microsoftaccountextension.dll | 10.0.14393.0 | Microsoft Account Extension DLL
|
| | microsoftaccounttokenprovider.dll | 10.0.14393.0 | Microsoft® Account Token Provider
|
| | microsoft-windows-mapcontrols.dll | 10.0.14393.187 | Map Event Resources
|
| | microsoft-windows-moshost.dll | 10.0.14393.187 | MosHost Event Resources
|
| | microsoft-windows-mostrace.dll | 10.0.14393.187 | MOS Event Resources
|
| | midimap.dll | 10.0.14393.0 | Microsoft MIDI Mapper
|
| | migisol.dll | 10.0.14393.0 | Migration System Isolation Layer
|
| | miguiresource.dll | 10.0.14393.0 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.14393.0 | MIME Filter
|
| | mimofcodec.dll | 10.0.14393.0 | Management Infrastructure mof codec component
|
| | minstoreevents.dll | 10.0.14393.0 | Minstore Event Resource
|
| | mintdh.dll | 10.0.14393.0 | Event Trace Helper Library
|
| | miracastreceiver.dll | 10.0.14393.206 | Miracast Receiver API
|
| | mirrordrvcompat.dll | 10.0.14393.0 | Mirror Driver Compatibility Helper
|
| | mispace.dll | 10.0.14393.351 | Storage Management Provider for Spaces
|
| | miutils.dll | 10.0.14393.0 | Management Infrastructure
|
| | mlang.dll | 10.0.14393.0 | Multi Language Support DLL
|
| | mmcbase.dll | 10.0.14393.0 | MMC Base DLL
|
| | mmci.dll | 10.0.14393.0 | Media class installer
|
| | mmcico.dll | 10.0.14393.0 | Media class co-installer
|
| | mmcndmgr.dll | 10.0.14393.0 | MMC Node Manager DLL
|
| | mmcshext.dll | 10.0.14393.0 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 10.0.14393.0 | MMDevice API
|
| | mmres.dll | 10.0.14393.0 | General Audio Resources
|
| | modemui.dll | 10.0.14393.0 | Windows Modem Properties
|
| | moricons.dll | 10.0.14393.0 | Windows NT Setup Icon Resources Library
|
| | mos.dll | 10.0.14393.351 | mos
|
| | moshostclient.dll | 10.0.14393.187 | MosHostClient
|
| | mosresource.dll | 10.0.14393.187 | Mos resource
|
| | mosstorage.dll | 10.0.14393.187 | MosStorage
|
| | mp3dmod.dll | 10.0.14393.0 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 10.0.14393.0 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 10.0.14393.0 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 10.0.14393.0 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 10.0.14393.0 | Multiple Provider Router DLL
|
| | mprapi.dll | 10.0.14393.206 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 10.0.14393.206 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 10.0.14393.206 | Dynamic Interface Manager
|
| | mprext.dll | 10.0.14393.0 | Multiple Provider Router Extension DLL
|
| | mprmsg.dll | 10.0.14393.0 | Multi-Protocol Router Service Messages DLL
|
| | mqcertui.dll | 10.0.10586.0 | Message Queuing Certificate Dialogs
|
| | mqsnap.dll | 10.0.10586.0 | Message Queuing Snapin
|
| | mrmcorer.dll | 10.0.14393.0 | Microsoft Windows MRM
|
| | mrmindexer.dll | 10.0.14393.0 | Microsoft Windows MRM
|
| | mrt_map.dll | 1.0.24120.0 | Microsoft .NET Native Error Reporting Helper
|
| | mrt100.dll | 1.0.24120.0 | Microsoft .NET Native Runtime
|
| | ms3dthumbnailprovider.dll | 10.0.14393.0 | 3MF Metadata Handler
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 10.0.14393.206 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 10.0.14393.0 | Microsoft ACM Audio Filter
|
| | msadce.dll | 10.0.14393.0 | OLE DB Cursor Engine
|
| | msadcer.dll | 10.0.14393.0 | OLE DB Cursor Engine Resources
|
| | msadco.dll | 10.0.14393.0 | Remote Data Services Data Control
|
| | msadcor.dll | 10.0.14393.0 | Remote Data Services Data Control Resources
|
| | msadds.dll | 10.0.14393.0 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 10.0.14393.0 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 10.0.14393.0 | ActiveX Data Objects Resources
|
| | msado15.dll | 10.0.14393.0 | ActiveX Data Objects
|
| | msadomd.dll | 10.0.14393.0 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 10.0.14393.0 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 10.0.14393.0 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 10.0.14393.0 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 10.0.14393.0 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msajapi.dll | 10.0.14393.187 | AllJoyn API Library
|
| | msalacdecoder.dll | 10.0.14393.0 | Media Foundation ALAC Decoder
|
| | msalacencoder.dll | 10.0.14393.0 | Media Foundation ALAC Encoder
|
| | msamrnbdecoder.dll | 10.0.14393.0 | AMR Narrowband Decoder DLL
|
| | msamrnbencoder.dll | 10.0.14393.0 | AMR Narrowband Encoder DLL
|
| | msamrnbsink.dll | 10.0.14393.0 | AMR Narrowband Sink DLL
|
| | msamrnbsource.dll | 10.0.14393.0 | AMR Narrowband Source DLL
|
| | msasn1.dll | 10.0.14393.0 | ASN.1 Runtime APIs
|
| | msauddecmft.dll | 10.0.14393.0 | Media Foundation Audio Decoders
|
| | msaudite.dll | 10.0.14393.0 | Security Audit Events DLL
|
| | msauserext.dll | 10.0.14393.0 | MSA USER Extension DLL
|
| | mscandui.dll | 10.0.14393.0 | MSCANDUI Server DLL
|
| | mscat32.dll | 10.0.14393.0 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 10.0.14393.0 | Microsoft Class Mini-driver
|
| | mscms.dll | 10.0.14393.0 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 10.0.14393.0 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 10.0.14393.0 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.8745 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 10.0.14393.0 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 10.0.14393.0 | ODBC Code Page Translator
|
| | msctf.dll | 10.0.14393.447 | MSCTF Server DLL
|
| | msctfmonitor.dll | 10.0.14393.0 | MsCtfMonitor DLL
|
| | msctfp.dll | 10.0.14393.0 | MSCTFP Server DLL
|
| | msctfui.dll | 10.0.14393.0 | MSCTFUI Server DLL
|
| | msctfuimanager.dll | 10.0.14393.0 | Microsoft UIManager DLL
|
| | msdadc.dll | 10.0.14393.0 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 10.0.14393.0 | Built-In Diagnostics
|
| | msdaenum.dll | 10.0.14393.0 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 10.0.14393.0 | OLE DB Error Collection Stub
|
| | msdaora.dll | 10.0.14393.0 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 10.0.14393.0 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 10.0.14393.0 | OLE DB Simple Provider
|
| | msdaprsr.dll | 10.0.14393.0 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 10.0.14393.0 | OLE DB Persistence Services
|
| | msdaps.dll | 10.0.14393.0 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 10.0.14393.0 | OLE DB Remote Provider
|
| | msdaremr.dll | 10.0.14393.0 | OLE DB Remote Provider Resources
|
| | msdart.dll | 10.0.14393.0 | OLE DB Runtime Routines
|
| | msdasc.dll | 10.0.14393.0 | OLE DB Service Components Stub
|
| | msdasql.dll | 10.0.14393.0 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 10.0.14393.0 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 10.0.14393.0 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 10.0.14393.0 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 10.0.14393.0 | OLE DB RootBinder Stub
|
| | msdelta.dll | 5.0.1.1 | Microsoft Patch Engine
|
| | msdfmap.dll | 10.0.14393.0 | Data Factory Handler
|
| | msdmeng.dll | 8.0.2039.0 | Microsoft Data Mining Engine
|
| | msdmine.dll | 8.0.2039.0 | Microsoft OLE DB Provider for Data Mining Services
|
| | msdmo.dll | 10.0.14393.0 | DMO Runtime
|
| | msdrm.dll | 10.0.14393.0 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 11.0.14393.321 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 11.0.14393.0 | Microsoft Feeds Background Sync
|
| | msflacdecoder.dll | 10.0.14393.0 | Media Foundation FLAC Decoder
|
| | msflacencoder.dll | 10.0.14393.0 | Media Foundation FLAC Encoder
|
| | msftedit.dll | 10.0.14393.206 | Rich Text Edit Control, v8.5
|
| | mshtml.dll | 11.0.14393.447 | Microsoft (R) HTML Viewer
|
| | mshtmldac.dll | 11.0.14393.0 | DAC for Trident DOM
|
| | mshtmled.dll | 11.0.14393.447 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 11.0.14393.0 | Microsoft® HTML Editing Component's Resource DLL
|
| | msi.dll | 5.0.14393.321 | Windows Installer
|
| | msidcrl40.dll | 10.0.14393.0 | Microsoft® Account Dynamic Link Library
|
| | msident.dll | 10.0.14393.0 | Microsoft Identity Manager
|
| | msidle.dll | 10.0.14393.0 | User Idle Monitor
|
| | msidntld.dll | 10.0.14393.0 | Microsoft Identity Manager
|
| | msieftp.dll | 10.0.14393.0 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.14393.0 | Windows® installer
|
| | msiltcfg.dll | 5.0.14393.0 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 10.0.14393.0 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.14393.0 | Windows® Installer International Messages
|
| | msimtf.dll | 10.0.14393.0 | Active IMM Server DLL
|
| | msisip.dll | 5.0.14393.0 | MSI Signature SIP Provider
|
| | msiwer.dll | 5.0.14393.0 | MSI Windows Error Reporting
|
| | msjet40.dll | 4.0.9765.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9765.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 10.0.14393.0 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | mskeyprotcli.dll | 10.0.14393.0 | Windows Client Key Protection Provider
|
| | mskeyprotect.dll | 10.0.14393.0 | Microsoft Key Protection Provider
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmapi32.dll | 12.0.4518.1014 | Extended MAPI 1.0 for Windows NT
|
| | msmdcb80.dll | 8.0.2039.0 | PivotTable Service dll
|
| | msmdgd80.dll | 8.0.2039.0 | Microsoft SQL Server Analysis Services driver
|
| | msmdlocal.dll | 9.0.3017.0 | Microsoft SQL Server Analysis Services
|
| | msmdun80.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | msmgdsrv.dll | 9.0.3017.0 | Microsoft SQL Server Analysis Services Managed Module
|
| | msmpeg2adec.dll | 10.0.14393.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 10.0.14393.0 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 10.0.14393.187 | Microsoft DTV-DVD Video Decoder
|
| | msobjs.dll | 10.0.14393.0 | System object audit names
|
| | msoeacct.dll | 10.0.14393.0 | Microsoft Internet Account Manager
|
| | msoert2.dll | 10.0.14393.0 | Microsoft Windows Mail RT Lib
|
| | msolap80.dll | 8.0.2216.0 | Microsoft OLE DB Provider for Analysis Services 8.0
|
| | msolap90.dll | 9.0.3017.0 | Microsoft OLE DB Provider for Analysis Services 9.0
|
| | msolui80.dll | 8.0.0.2039 | Microsoft OLE DB provider for Analysis Services connection dialog 8.0
|
| | msolui90.dll | 9.0.3017.0 | Microsoft OLE DB Provider for Analysis Services Connection Dialog 9.0
|
| | msopusdecoder.dll | 10.0.14393.0 | Media Foundation Opus Decoder
|
| | msorc32r.dll | 10.0.14393.0 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 10.0.14393.0 | ODBC Driver for Oracle
|
| | mspatcha.dll | 5.0.1.1 | Microsoft File Patch Application API
|
| | mspatchc.dll | 5.0.1.1 | Microsoft Patch Creation Engine
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msphotography.dll | 10.0.14393.0 | MS Photography DLL
|
| | msports.dll | 10.0.14393.0 | Ports Class Installer
|
| | msrating.dll | 10.0.14393.0 | "msrating.DYNLINK"
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 10.0.14393.0 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 10.0.14393.0 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 10.0.14393.0 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.14393.0 | PKM Perfmon Counter DLL
|
| | mssign32.dll | 10.0.14393.0 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 10.0.14393.0 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.14393.0 | mssitlb
|
| | msspellcheckingfacility.dll | 10.0.14393.0 | Microsoft Spell Checking Facility
|
| | mssph.dll | 7.0.14393.0 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.14393.0 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.14393.0 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.14393.206 | Microsoft Embedded Search
|
| | msstdfmt.dll | 6.0.84.50 | Microsoft Standard Data Formating Object DLL
|
| | mssvp.dll | 7.0.14393.0 | MSSearch Vista Platform
|
| | mstask.dll | 10.0.14393.0 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 10.0.14393.447 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 10.0.14393.0 | MSUTB Server DLL
|
| | msv1_0.dll | 10.0.14393.447 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.14393.0 | Windows NT IOStreams DLL
|
| | msvcp_win.dll | 10.0.14393.0 | Microsoft® C Runtime Library
|
| | msvcp100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcp110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcp110_win.dll | 10.0.14393.0 | Microsoft® STL110 C++ Runtime Library
|
| | msvcp120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcp120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcp60.dll | 7.0.14393.0 | Windows NT C++ Runtime Library DLL
|
| | msvcp71.dll | 7.10.3077.0 | Microsoft® C++ Runtime Library
|
| | msvcr100.dll | 10.0.40219.325 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 14.6.1586.0 | Microsoft® .NET Framework
|
| | msvcr110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcr120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcr120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcr71.dll | 7.10.3052.4 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.14393.0 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 10.0.14393.0 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 10.0.14393.0 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 10.0.14393.0 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.14393.447 | ActiveX control for streaming video
|
| | msvideodsp.dll | 10.0.14393.0 | Video Stabilization MFT
|
| | msvp9dec.dll | 10.0.14393.0 | Windows VP9 Video Decoder
|
| | msvproc.dll | 10.0.14393.351 | Media Foundation Video Processor
|
| | msvpxenc.dll | 10.0.14393.206 | Windows VPX Video Encoder
|
| | mswb7.dll | 10.0.14393.0 | MSWB7 DLL
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.14393.0 | Windows Media Device Manager Core
|
| | mswsock.dll | 10.0.14393.0 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9765.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 10.0.14393.0 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.14393.0 | MSXML 3.0
|
| | msxml3r.dll | 8.110.14393.0 | XML Resources
|
| | msxml6.dll | 6.30.14393.321 | MSXML 6.0
|
| | msxml6r.dll | 6.30.14393.187 | XML Resources
|
| | msyuv.dll | 10.0.14393.0 | Microsoft UYVY Video Decompressor
|
| | mtf.dll | 10.0.14393.0 | "MTF.DYNLINK"
|
| | mtxclu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.10941.16384 | COM+
|
| | mtxex.dll | 2001.12.10941.16384 | COM+
|
| | mtxlegih.dll | 2001.12.10941.16384 | COM+
|
| | mtxoci.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 10.0.14393.0 | MUI Callback for font registry settings
|
| | mycomput.dll | 10.0.14393.0 | Computer Management
|
| | mydocs.dll | 10.0.14393.0 | My Documents Folder UI
|
| | napcrypt.dll | 10.0.14393.0 | NAP Cryptographic API helper
|
| | napinsp.dll | 10.0.14393.0 | E-mail Naming Shim Provider
|
| | naturallanguage6.dll | 10.0.14393.206 | Natural Language Development Platform 6
|
| | ncaapi.dll | 10.0.14393.0 | Microsoft Network Connectivity Assistant API
|
| | ncdprop.dll | 10.0.14393.0 | Advanced network device properties
|
| | nci.dll | 10.0.14393.0 | CoInstaller: NET
|
| | ncobjapi.dll | 10.0.14393.0 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 10.0.14393.0 | Windows NCrypt Router
|
| | ncryptprov.dll | 10.0.14393.0 | Microsoft KSP
|
| | ncryptsslp.dll | 10.0.14393.0 | Microsoft SChannel Provider
|
| | nddeapi.dll | 10.0.14393.0 | Network DDE Share Management APIs
|
| | ndfapi.dll | 10.0.14393.0 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 10.0.14393.0 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 10.0.14393.0 | Network Diagnostic Framework HC Discovery API
|
| | ndishc.dll | 10.0.14393.0 | NDIS Helper Classes
|
| | ndproxystub.dll | 10.0.14393.0 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 10.0.14393.0 | NegoExtender Security Package
|
| | netapi32.dll | 10.0.14393.0 | Net Win32 API DLL
|
| | netbios.dll | 10.0.14393.0 | NetBIOS Interface Library
|
| | netcenter.dll | 10.0.14393.0 | Network Center control panel
|
| | netcfgx.dll | 10.0.14393.0 | Network Configuration Objects
|
| | netcorehc.dll | 10.0.14393.0 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 10.0.14393.0 | Network Diagnostic Framework
|
| | netevent.dll | 10.0.14393.0 | Net Event Handler
|
| | netfxperf.dll | 10.0.14393.0 | Extensible Performance Counter Shim
|
| | neth.dll | 10.0.14393.0 | Net Help Messages DLL
|
| | netid.dll | 10.0.14393.0 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 10.0.14393.0 | Netio Helper DLL
|
| | netjoin.dll | 10.0.14393.0 | Domain Join DLL
|
| | netlogon.dll | 10.0.14393.0 | Net Logon Services DLL
|
| | netmsg.dll | 10.0.14393.0 | Net Messages DLL
|
| | netplwiz.dll | 10.0.14393.0 | Map Network Drives/Network Places Wizard
|
| | netprofm.dll | 10.0.14393.0 | Network List Manager
|
| | netprovfw.dll | 10.0.14393.0 | Provisioning Service Framework DLL
|
| | netprovisionsp.dll | 10.0.14393.0 | Provisioning Service Provider DLL
|
| | netsetupapi.dll | 10.0.14393.447 | Network Configuration API
|
| | netsetupengine.dll | 10.0.14393.447 | Network Configuration Engine
|
| | netsetupshim.dll | 10.0.14393.0 | Network Configuration API
|
| | netshell.dll | 10.0.14393.321 | Network Connections Shell
|
| | netutils.dll | 10.0.14393.0 | Net Win32 API Helpers DLL
|
| | networkcollectionagent.dll | 11.0.14393.206 | Network Collection Agent
|
| | networkexplorer.dll | 10.0.14393.0 | Network Explorer
|
| | networkhelper.dll | 10.0.14393.0 | Network utilities for mail, contacts, calendar
|
| | networkitemfactory.dll | 10.0.14393.0 | NetworkItem Factory
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | ngccredprov.dll | 10.0.14393.206 | Microsoft Passport Credential Provider
|
| | ngckeyenum.dll | 10.0.14393.0 | Microsoft Passport Key Enumeration Manager
|
| | ngcksp.dll | 10.0.14393.0 | Microsoft Passport Key Storage Provider
|
| | ninput.dll | 10.0.14393.0 | Microsoft Pen and Touch Input Component
|
| | nlaapi.dll | 10.0.14393.0 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.14393.0 | HTML filter
|
| | nlmgp.dll | 10.0.14393.0 | Network List Manager Snapin
|
| | nlmproxy.dll | 10.0.14393.0 | Network List Manager Public Proxy
|
| | nlmsprep.dll | 10.0.14393.0 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 10.0.14393.0 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 10.0.14393.0 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0009.dll | 10.0.14393.0 | Microsoft English Natural Language Server Data and Code
|
| | nlsdl.dll | 10.0.14393.0 | Nls Downlevel DLL
|
| | nlslexicons0009.dll | 10.0.14393.0 | Microsoft English Natural Language Server Data and Code
|
| | nmaa.dll | 10.0.14393.351 | NMAA
|
| | nmadirect.dll | 10.0.14393.187 | Nma Direct
|
| | normaliz.dll | 10.0.14393.0 | Unicode Normalization DLL
|
| | notificationobjfactory.dll | 10.0.14393.0 | Notifications Object Factory
|
| | npmproxy.dll | 10.0.14393.0 | Network List Manager Proxy
|
| | npsm.dll | 10.0.14393.447 | NPSM
|
| | npsmdesktopprovider.dll | 10.0.14393.0 | <d> NPSM Desktop Local Provider DLL
|
| | nshhttp.dll | 10.0.14393.0 | HTTP netsh DLL
|
| | nshipsec.dll | 10.0.14393.0 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 10.0.14393.206 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 10.0.14393.0 | NSI User-mode interface DLL
|
| | ntasn1.dll | 10.0.14393.0 | Microsoft ASN.1 API
|
| | ntdll.dll | 10.0.14393.447 | NT Layer DLL
|
| | ntdsapi.dll | 10.0.14393.0 | Active Directory Domain Services API
|
| | ntlanman.dll | 10.0.14393.0 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 10.0.14393.0 | Network object shell UI
|
| | ntlmshared.dll | 10.0.14393.0 | NTLM Shared Functionality
|
| | ntmarta.dll | 10.0.14393.0 | Windows NT MARTA provider
|
| | ntprint.dll | 10.0.14393.0 | Spooler Setup DLL
|
| | ntshrui.dll | 10.0.14393.447 | Shell extensions for sharing
|
| | ntvdm64.dll | 10.0.14393.0 | 16-bit Emulation on NT64
|
| | objsel.dll | 10.0.14393.0 | Object Picker Dialog
|
| | occache.dll | 11.0.14393.0 | Object Control Viewer
|
| | ocsetapi.dll | 10.0.14393.0 | Windows Optional Component Setup API
|
| | odbc32.dll | 10.0.14393.0 | ODBC Driver Manager
|
| | odbcbcp.dll | 10.0.14393.0 | BCP for ODBC
|
| | odbcconf.dll | 10.0.14393.206 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 10.0.14393.0 | ODBC Installer
|
| | odbccr32.dll | 10.0.14393.0 | ODBC Cursor Library
|
| | odbccu32.dll | 10.0.14393.0 | ODBC Cursor Library
|
| | odbcint.dll | 10.0.14393.0 | ODBC Resources
|
| | odbcji32.dll | 10.0.14393.0 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 10.0.14393.0 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 10.0.14393.0 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 10.0.14393.0 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 10.0.14393.0 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 10.0.14393.0 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 10.0.14393.0 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 10.0.14393.0 | ODBC (3.0) driver for text files
|
| | oemlicense.dll | 10.0.14393.0 | Client Licensing Platform Client Provisioning
|
| | offfilt.dll | 2008.0.14393.0 | OFFICE Filter
|
| | offlinelsa.dll | 10.0.14393.82 | Windows
|
| | offlinesam.dll | 10.0.14393.206 | Windows
|
| | offreg.dll | 10.0.14393.321 | Offline registry DLL
|
| | ole2.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2disp.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2nls.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole32.dll | 10.0.14393.447 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.2.14393.206 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.2.14393.0 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.2.14393.0 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 10.0.14393.447 | OLEAUT32.DLL
|
| | olecli32.dll | 10.0.14393.0 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 10.0.14393.206 | OLE DB Core Services
|
| | oledb32r.dll | 10.0.14393.0 | OLE DB Core Services Resources
|
| | oledlg.dll | 10.0.14393.0 | OLE User Interface Support
|
| | oleprn.dll | 10.0.14393.0 | Oleprn DLL
|
| | olepro32.dll | 10.0.14393.447 | OLEPRO32.DLL
|
| | olesvr32.dll | 10.0.14393.0 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 10.0.14393.0 | Microsoft OLE for Windows
|
| | omadmapi.dll | 10.0.14393.0 | omadmapi
|
| | ondemandbrokerclient.dll | 10.0.14393.0 | OnDemandBrokerClient
|
| | ondemandconnroutehelper.dll | 10.0.14393.0 | On Demand Connctiond Route Helper
|
| | onecorecommonproxystub.dll | 10.0.14393.0 | OneCore Common Proxy Stub
|
| | onecoreuapcommonproxystub.dll | 10.0.14393.0 | OneCoreUAP Common Proxy Stub
|
| | onedrivesettingsyncprovider.dll | 10.0.14393.187 | OneDrive Setting Sync
|
| | onex.dll | 10.0.14393.0 | IEEE 802.1X supplicant library
|
| | onexui.dll | 10.0.14393.0 | IEEE 802.1X supplicant UI library
|
| | oobefldr.dll | 10.0.14393.0 | Getting Started
|
| | opcservices.dll | 10.0.14393.0 | Native Code OPC Services Library
|
| | opencl.dll | 21.19.137.1 | OpenCL Client DLL
|
| | opengl32.dll | 10.0.14393.0 | OpenGL Client DLL
|
| | ortcengine.dll | 6.0.8959.193 | Microsoft Skype ORTC Engine
|
| | osbaseln.dll | 10.0.14393.0 | Service Reporting API
|
| | osksupport.dll | 10.0.14393.0 | Microsoft On-Screen Keyboard Support Utilities
|
| | osuninst.dll | 10.0.14393.0 | Uninstall Interface
|
| | p2p.dll | 10.0.14393.0 | Peer-to-Peer Grouping
|
| | p2pgraph.dll | 10.0.14393.0 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 10.0.14393.0 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 10.0.14393.0 | Object Packager2
|
| | packagestateroaming.dll | 10.0.14393.0 | Package State Roaming
|
| | panmap.dll | 10.0.14393.0 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 10.0.14393.0 | Auto Enrollment DLL
|
| | pcacli.dll | 10.0.14393.0 | Program Compatibility Assistant Client Module
|
| | pcaui.dll | 10.0.14393.0 | Program Compatibility Assistant User Interface Module
|
| | pcpksp.dll | 10.0.14393.0 | Microsoft Platform Key Storage Provider for Platform Crypto Provider
|
| | pcptpm12.dll | 10.0.14393.0 | Microsoft Platform Crypto Provider for Trusted Platform Module 1.2
|
| | pcshellcommonproxystub.dll | 10.0.14393.0 | PCShell Common Proxy Stub
|
| | pcwum.dll | 10.0.14393.0 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 10.0.14393.206 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 10.0.14393.0 | PDH UI
|
| | peerdist.dll | 10.0.14393.0 | BranchCache Client Library
|
| | peerdistsh.dll | 10.0.14393.0 | BranchCache Netshell Helper
|
| | perfctrs.dll | 10.0.14393.0 | Performance Counters
|
| | perfdisk.dll | 10.0.14393.0 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 10.0.14393.0 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 10.0.14393.0 | Windows System Performance Objects DLL
|
| | perfproc.dll | 10.0.14393.0 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 10.0.14393.0 | Windows Remote Desktop Services Performance Objects
|
| | personax.dll | 10.0.14393.0 | PersonaX
|
| | phonecallhistoryapis.dll | 10.0.14393.0 | DLL for PhoneCallHistoryRT
|
| | phoneom.dll | 10.0.14393.0 | Phone Object Model
|
| | phoneplatformabstraction.dll | 10.0.14393.0 | Phone Platform Abstraction
|
| | phoneutil.dll | 10.0.14393.187 | Phone utilities
|
| | phoneutilres.dll | 10.0.14393.187 | Resource DLL for Phone utilities
|
| | photometadatahandler.dll | 10.0.14393.0 | Photo Metadata Handler
|
| | photowiz.dll | 10.0.14393.0 | Photo Printing Wizard
|
| | pid.dll | 10.0.14393.0 | Microsoft PID
|
| | pidgenx.dll | 10.0.14393.67 | Pid Generation
|
| | pifmgr.dll | 10.0.14393.0 | Windows NT PIF Manager Icon Resources Library
|
| | pimindexmaintenanceclient.dll | 10.0.14393.0 | Client dll for Pim Index Maintenance
|
| | pimstore.dll | 10.0.14393.0 | POOM
|
| | pku2u.dll | 10.0.14393.0 | Pku2u Security Package
|
| | pla.dll | 10.0.14393.0 | Performance Logs & Alerts
|
| | playlistfolder.dll | 10.0.14393.0 | Playlist Folder
|
| | playsndsrv.dll | 10.0.14393.0 | PlaySound Service
|
| | playtodevice.dll | 10.0.14393.206 | PLAYTODEVICE DLL
|
| | playtomanager.dll | 10.0.14393.206 | Microsoft Windows PlayTo Manager
|
| | playtomenu.dll | 12.0.14393.0 | Cast to Device Menu DLL
|
| | playtoreceiver.dll | 10.0.14393.206 | DLNA DMR DLL
|
| | playtostatusprovider.dll | 10.0.14393.0 | PlayTo Status Provider Dll
|
| | pngfilt.dll | 11.0.14393.0 | IE PNG plugin image decoder
|
| | pnrpnsp.dll | 10.0.14393.0 | PNRP Name Space Provider
|
| | policymanager.dll | 10.0.14393.0 | Policy Manager DLL
|
| | polstore.dll | 10.0.14393.0 | Policy Storage dll
|
| | portabledeviceapi.dll | 10.0.14393.0 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 10.0.14393.0 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 10.0.14393.0 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 10.0.14393.0 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 10.0.14393.0 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 10.0.14393.0 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 10.0.14393.0 | PortableDevice WIA Compatibility Driver
|
| | posyncservices.dll | 10.0.14393.187 | Change Tracking
|
| | pots.dll | 10.0.14393.0 | Power Troubleshooter
|
| | powercpl.dll | 10.0.14393.0 | Power Options Control Panel
|
| | powrprof.dll | 10.0.14393.0 | Power Profile Helper DLL
|
| | presentationhostproxy.dll | 10.0.14393.0 | Windows Presentation Foundation Host Proxy
|
| | prflbmsg.dll | 10.0.14393.0 | Perflib Event Messages
|
| | printconfig.dll | 0.3.14393.0 | PrintConfig User Interface
|
| | printdialogs.dll | 10.0.14393.206 | Microsoft® Windows® Operating System
|
| | printplatformconfig.dll | 10.0.14393.0 | Legacy Print Platform Adapter
|
| | printui.dll | 10.0.14393.0 | Printer Settings User Interface
|
| | prncache.dll | 10.0.14393.0 | Print UI Cache
|
| | prnfldr.dll | 10.0.14393.0 | prnfldr dll
|
| | prnntfy.dll | 10.0.14393.0 | prnntfy DLL
|
| | prntvpt.dll | 10.0.14393.0 | Print Ticket Services Module
|
| | profapi.dll | 10.0.14393.0 | User Profile Basic API
|
| | profext.dll | 10.0.14393.0 | profext
|
| | propsys.dll | 7.0.14393.0 | Microsoft Property System
|
| | provcore.dll | 10.0.14393.0 | Microsoft Wireless Provisioning Core
|
| | provsvc.dll | 10.0.14393.0 | Windows HomeGroup
|
| | provthrd.dll | 10.0.14393.0 | WMI Provider Thread & Log Library
|
| | proximitycommon.dll | 10.0.14393.0 | Proximity Common Implementation
|
| | proximitycommonpal.dll | 10.0.14393.0 | Proximity Common PAL
|
| | proximityrtapipal.dll | 10.0.14393.0 | Proximity WinRT API PAL
|
| | prvdmofcomp.dll | 10.0.14393.0 | WMI
|
| | psapi.dll | 10.0.14393.0 | Process Status Helper
|
| | pshed.dll | 10.0.14393.0 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 10.0.14393.0 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | psmodulediscoveryprovider.dll | 10.0.14393.0 | WMI
|
| | pstorec.dll | 10.0.14393.0 | Deprecated Protected Storage COM interfaces
|
| | puiapi.dll | 10.0.14393.0 | puiapi DLL
|
| | puiobj.dll | 10.0.14393.0 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 10.0.14393.206 | pwrshplugin.dll
|
| | qasf.dll | 12.0.14393.0 | DirectShow ASF Support
|
| | qcap.dll | 10.0.14393.0 | DirectShow Runtime.
|
| | qdv.dll | 10.0.14393.0 | DirectShow Runtime.
|
| | qdvd.dll | 10.0.14393.187 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 10.0.14393.0 | DirectShow Editing.
|
| | qedwipes.dll | 10.0.14393.0 | DirectShow Editing SMPTE Wipes
|
| | quartz.dll | 10.0.14393.0 | DirectShow Runtime.
|
| | query.dll | 10.0.14393.0 | Content Index Utility DLL
|
| | qwave.dll | 10.0.14393.0 | Windows NT
|
| | racengn.dll | 10.0.14393.0 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 10.0.14393.0 | Remote Assistance Contact List
|
| | radardt.dll | 10.0.14393.0 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 10.0.14393.0 | Microsoft Windows Resource Exhaustion Resolver
|
| | radcui.dll | 10.0.14393.0 | RemoteApp and Desktop Connection UI Component
|
| | rasadhlp.dll | 10.0.14393.0 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 10.0.14393.0 | Remote Access API
|
| | raschap.dll | 10.0.14393.0 | Remote Access PPP CHAP
|
| | raschapext.dll | 10.0.14393.0 | Windows Extension library for raschap
|
| | rasctrs.dll | 10.0.14393.0 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 10.0.14393.0 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 10.0.14393.0 | Remote Access Common Dialog API
|
| | rasgcw.dll | 10.0.14393.0 | RAS Wizard Pages
|
| | rasman.dll | 10.0.14393.0 | Remote Access Connection Manager
|
| | rasmontr.dll | 10.0.14393.0 | RAS Monitor DLL
|
| | rasplap.dll | 10.0.14393.0 | RAS PLAP Credential Provider
|
| | rasppp.dll | 10.0.14393.0 | Remote Access PPP
|
| | rastapi.dll | 10.0.14393.0 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 10.0.14393.0 | Remote Access PPP EAP-TLS
|
| | rastlsext.dll | 10.0.14393.0 | Windows Extension library for rastls
|
| | rdpcore.dll | 10.0.14393.447 | RDP Core DLL
|
| | rdpencom.dll | 10.0.14393.0 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 10.0.14393.0 | RDP Audio Endpoint
|
| | rdpsaps.dll | 10.0.14393.0 | RDP Session Agent Proxy Stub
|
| | rdvgocl32.dll | 10.0.14393.0 | Microsoft RemoteFX OpenCL ICD
|
| | rdvgogl32.dll | 10.0.14393.0 | Microsoft RemoteFX OpenGL
|
| | rdvgu1132.dll | 10.0.14393.0 | Microsoft RemoteFX Virtual GPU
|
| | rdvgumd32.dll | 10.0.14393.0 | Microsoft RemoteFX Virtual GPU
|
| | rdvvmtransport.dll | 10.0.14393.0 | RdvVmTransport EndPoints
|
| | reagent.dll | 10.0.14393.206 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 10.0.14393.0 | Registry Configuration APIs
|
| | regctrl.dll | 10.0.14393.0 | RegCtrl
|
| | reinfo.dll | 10.0.14393.0 | Microsoft Windows Recovery Info DLL
|
| | remoteaudioendpoint.dll | 10.0.14393.0 | Remote Audio Endpoint
|
| | remotenaturallanguage.dll | 1.0.0.1 | Speech Client Communication To Backend Speech Services Library.
|
| | remotepg.dll | 10.0.14393.0 | Remote Sessions CPL Extension
|
| | removedevicecontexthandler.dll | 10.0.14393.0 | Devices & Printers Remove Device Context Menu Handler
|
| | removedeviceelevated.dll | 10.0.14393.0 | RemoveDeviceElevated Proxy Dll
|
| | resampledmo.dll | 10.0.14393.0 | Windows Media Resampler
|
| | resourcepolicyclient.dll | 10.0.14393.0 | Resource Policy Client
|
| | resutils.dll | 10.0.14393.82 | Microsoft Cluster Resource Utility DLL
|
| | rfxvmt.dll | 10.0.14393.0 | Microsoft RemoteFX VM Transport
|
| | rgb9rast.dll | 10.0.14393.0 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1231 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 10.0.14393.0 | Wrapper Dll for Richedit 1.0
|
| | rmclient.dll | 10.0.14393.0 | Resource Manager Client
|
| | rnr20.dll | 10.0.14393.0 | Windows Socket2 NameSpace DLL
|
| | rometadata.dll | 4.6.1586.0 | Microsoft MetaData Library
|
| | rpchttp.dll | 10.0.14393.0 | RPC HTTP DLL
|
| | rpcns4.dll | 10.0.14393.0 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 10.0.14393.0 | RPC Netshell Helper
|
| | rpcrt4.dll | 10.0.14393.82 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 10.0.14393.0 | Remote RPC Extension
|
| | rsaenh.dll | 10.0.14393.0 | Microsoft Enhanced Cryptographic Provider
|
| | rshx32.dll | 10.0.14393.0 | Security Shell Extension
|
| | rstrtmgr.dll | 10.0.14393.0 | Restart Manager
|
| | rtffilt.dll | 2008.0.14393.0 | RTF Filter
|
| | rtm.dll | 10.0.14393.0 | Routing Table Manager
|
| | rtmcodecs.dll | 6.0.8959.193 | Microsoft Real Time Media Codec Library
|
| | rtmediaframe.dll | 10.0.14393.206 | Windows Runtime MediaFrame DLL
|
| | rtmmvrortc.dll | 6.0.8959.193 | Microsoft Real Time Media ORTC Video Renderer
|
| | rtmpal.dll | 6.0.8959.193 | Microsoft Real Time Media Stack PAL for ORTC
|
| | rtmpltfm.dll | 6.0.8959.193 | Microsoft Real Time Media Stack
|
| | rtutils.dll | 10.0.14393.0 | Routing Utilities
|
| | rtworkq.dll | 10.0.14393.0 | Realtime WorkQueue DLL
|
| | samcli.dll | 10.0.14393.0 | Security Accounts Manager Client DLL
|
| | samlib.dll | 10.0.14393.82 | SAM Library DLL
|
| | sas.dll | 10.0.14393.0 | WinLogon Software SAS Library
|
| | sbe.dll | 10.0.14393.0 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.14393.0 | Stream Buffer IO DLL
|
| | sberes.dll | 10.0.14393.0 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 10.0.14393.0 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 10.0.14393.0 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 10.0.14393.0 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 10.0.14393.0 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 10.0.14393.103 | TLS / SSL Security Provider
|
| | schedcli.dll | 10.0.14393.0 | Scheduler Service Client DLL
|
| | scksp.dll | 10.0.14393.0 | Microsoft Smart Card Key Storage Provider
|
| | scp32.dll | 2.0.330.0 | Code Page Translation Library
|
| | scripto.dll | 6.6.14393.0 | Microsoft ScriptO
|
| | scrobj.dll | 5.812.10240.16384 | Windows ® Script Component Runtime
|
| | scrptadm.dll | 10.0.14393.0 | Script Adm Extension
|
| | scrrun.dll | 5.812.10240.16384 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 10.0.14393.0 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 10.0.14393.0 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 10.0.14393.0 | NPS SDO Helper Component
|
| | search.protocolhandler.mapi2.dll | 7.0.14393.206 | Microsoft Search Protocol Handler for MAPI2
|
| | searchfolder.dll | 10.0.14393.0 | SearchFolder
|
| | sechost.dll | 10.0.14393.0 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 10.0.14393.0 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 10.0.14393.0 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 10.0.14393.0 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 10.0.14393.0 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 10.0.14393.0 | Security Support Provider Interface
|
| | security.dll | 10.0.14393.0 | Security Support Provider Interface
|
| | sendmail.dll | 10.0.14393.0 | Send Mail
|
| | sensapi.dll | 10.0.14393.0 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 10.0.14393.0 | Sensor API
|
| | sensorscpl.dll | 10.0.14393.0 | Open Location and Other Sensors
|
| | sensorsnativeapi.dll | 10.0.14393.0 | Sensors Native API
|
| | sensorsnativeapi.v2.dll | 10.0.14393.0 | Sensors Native API (V2 stack)
|
| | sensorsutilsv2.dll | 10.0.14393.0 | Sensors v2 Utilities DLL
|
| | serialui.dll | 10.0.14393.0 | Serial Port Property Pages
|
| | serwvdrv.dll | 10.0.14393.0 | Unimodem Serial Wave driver
|
| | sessenv.dll | 10.0.14393.206 | Remote Desktop Configuration service
|
| | settingmonitor.dll | 10.0.14393.0 | Setting Synchronization Change Monitor
|
| | settingsync.dll | 10.0.14393.187 | Setting Synchronization
|
| | settingsynccore.dll | 10.0.14393.187 | Setting Synchronization Core
|
| | settingsyncpolicy.dll | 10.0.14393.82 | SettingSync Policy
|
| | setupapi.dll | 10.0.14393.0 | Windows Setup API
|
| | setupcln.dll | 10.0.14393.0 | Setup Files Cleanup
|
| | sfc.dll | 10.0.14393.0 | Windows File Protection
|
| | sfc_os.dll | 10.0.14393.0 | Windows File Protection
|
| | shacct.dll | 10.0.14393.0 | Shell Accounts Classes
|
| | shacctprofile.dll | 10.0.14393.0 | Shell Accounts Profile Classes
|
| | sharehost.dll | 10.0.14393.321 | ShareHost
|
| | shcore.dll | 10.0.14393.0 | SHCORE
|
| | shdocvw.dll | 10.0.14393.0 | Shell Doc Object and Control Library
|
| | shell32.dll | 10.0.14393.447 | Windows Shell Common Dll
|
| | shellcommoncommonproxystub.dll | 10.0.14393.0 | ShellCommon Common Proxy Stub
|
| | shellstyle.dll | 10.0.14393.0 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 10.0.14393.0 | Shell Folder Service
|
| | shgina.dll | 10.0.14393.0 | Windows Shell User Logon
|
| | shimeng.dll | 10.0.14393.0 | Shim Engine DLL
|
| | shimgvw.dll | 10.0.14393.0 | Photo Gallery Viewer
|
| | shlwapi.dll | 10.0.14393.0 | Shell Light-weight Utility Library
|
| | shpafact.dll | 10.0.14393.0 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 10.0.14393.0 | Shell setup helper
|
| | shsvcs.dll | 10.0.14393.0 | Windows Shell Services Dll
|
| | shunimpl.dll | 10.0.14393.0 | Windows Shell Obsolete APIs
|
| | shutdownext.dll | 10.0.14393.0 | Shutdown Graphic User Interface
|
| | shwebsvc.dll | 10.0.14393.0 | Windows Shell Web Services
|
| | signdrv.dll | 10.0.14393.0 | WMI provider for Signed Drivers
|
| | simauth.dll | 10.0.14393.0 | EAP SIM run-time dll
|
| | simcfg.dll | 10.0.14393.0 | EAP SIM config dll
|
| | slc.dll | 10.0.14393.67 | Software Licensing Client Dll
|
| | slcext.dll | 10.0.14393.67 | Software Licensing Client Extension Dll
|
| | slwga.dll | 10.0.14393.0 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 10.0.14393.0 | Windows Smartcard Credential Provider
|
| | smartscreenps.dll | 10.0.14393.0 | SmartScreenPS
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | smphost.dll | 10.0.14393.82 | Storage Management Provider (SMP) host service
|
| | sndvolsso.dll | 10.0.14393.351 | SCA Volume
|
| | snmpapi.dll | 10.0.14393.0 | SNMP Utility Library
|
| | socialapis.dll | 10.0.14393.0 | DLL for SocialRT
|
| | softkbd.dll | 10.0.14393.0 | Soft Keyboard Server and Tip
|
| | softpub.dll | 10.0.14393.0 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 10.0.14393.0 | Sort Version Server 2003
|
| | sortwindows61.dll | 10.0.14393.0 | SortWindows61 Dll
|
| | sortwindows6compat.dll | 10.0.14393.0 | Sort Version Windows 6.0
|
| | spbcd.dll | 10.0.14393.0 | BCD Sysprep Plugin
|
| | spfileq.dll | 10.0.14393.0 | Windows SPFILEQ
|
| | spinf.dll | 10.0.14393.0 | Windows SPINF
|
| | spnet.dll | 10.0.14393.0 | Net Sysprep Plugin
|
| | spopk.dll | 10.0.14393.0 | OPK Sysprep Plugin
|
| | spp.dll | 10.0.14393.0 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 10.0.14393.67 | Software Licensing Client Dll
|
| | sppcext.dll | 10.0.14393.206 | Software Protection Platform Client Extension Dll
|
| | sppinst.dll | 10.0.14393.0 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 10.0.14393.0 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 10.0.14393.0 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 10.0.14393.0 | Setup Wizard Framework
|
| | spwizimg.dll | 10.0.14393.0 | Setup Wizard Framework Resources
|
| | spwizres.dll | 10.0.14393.0 | Setup Wizard Framework Resources
|
| | spwmp.dll | 12.0.14393.82 | Windows Media Player System Preparation DLL
|
| | sqlcecompact40.dll | 4.0.8275.1 | Database Repair Tool (32-bit)
|
| | sqlceoledb40.dll | 4.0.14393.1 | OLEDB Provider (32-bit)
|
| | sqlceqp40.dll | 4.0.14393.1 | Query Processor (32-bit)
|
| | sqlcese40.dll | 4.0.14393.1 | Storage Engine (32-bit)
|
| | sqloledb.dll | 10.0.14393.0 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 10.0.14393.0 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 2000.80.2039.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 2000.80.2040.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 10.0.14393.0 | XML extensions for SQL Server
|
| | sqmapi.dll | 10.0.14393.0 | SQM Client
|
| | srchadmin.dll | 7.0.14393.0 | Indexing Options
|
| | srclient.dll | 10.0.14393.0 | Microsoft® Windows System Restore Client Library
|
| | srm.dll | 10.0.14393.0 | Microsoft® File Server Resource Manager Common Library
|
| | srm_ps.dll | 10.0.14393.0 | Microsoft® FSRM internal proxy/stub
|
| | srmclient.dll | 10.0.14393.0 | Microsoft® File Server Resource Management Client Extensions
|
| | srmlib.dll | 10.0.14393.0 | Microsoft (R) File Server Resource Management Interop Assembly
|
| | srmscan.dll | 10.0.14393.0 | Microsoft® File Server Storage Reports Scan Engine
|
| | srmshell.dll | 10.0.14393.0 | Microsoft® File Server Resource Management Shell Extension
|
| | srmstormod.dll | 10.0.14393.0 | Microsoft® File Server Resource Management Office Parser
|
| | srmtrace.dll | 10.0.14393.0 | Microsoft® File Server Resource Management Tracing Library
|
| | srpapi.dll | 10.0.14393.0 | SRP APIs Dll
|
| | srpuxnativesnapin.dll | 10.0.14393.0 | Application Control Policies Group Policy Editor Extension
|
| | srumapi.dll | 10.0.14393.0 | System Resource Usage Monitor API
|
| | srumsvc.dll | 10.0.14393.0 | System Resource Usage Monitor Service
|
| | srvcli.dll | 10.0.14393.0 | Server Service Client DLL
|
| | sscore.dll | 10.0.14393.0 | Server Service Core DLL
|
| | ssdpapi.dll | 10.0.14393.0 | SSDP Client API DLL
|
| | sspicli.dll | 10.0.14393.187 | Security Support Provider Interface
|
| | ssshim.dll | 10.0.14393.0 | Windows Componentization Platform Servicing API
|
| | startupscan.dll | 10.0.14393.0 | Startup scan task DLL
|
| | staterepository.core.dll | 10.0.14393.0 | StateRepository Core
|
| | stclient.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Client
|
| | sti.dll | 10.0.14393.0 | Still Image Devices client DLL
|
| | stobject.dll | 10.0.14393.447 | Systray shell service object
|
| | storage.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | storagecontexthandler.dll | 10.0.14393.0 | Device Center Storage Context Menu Handler
|
| | storagewmi.dll | 10.0.14393.206 | WMI Provider for Storage Management
|
| | storagewmi_passthru.dll | 10.0.14393.103 | WMI PassThru Provider for Storage Management
|
| | storeagent.dll | 10.0.14393.447 | StoreAgent
|
| | storprop.dll | 10.0.14393.0 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.14393.0 | Structured Query
|
| | sud.dll | 10.0.14393.447 | SUD Control Panel
|
| | sxproxy.dll | 10.0.14393.0 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 10.0.14393.0 | Fusion 2.5
|
| | sxshared.dll | 10.0.14393.0 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 10.0.14393.0 | Sxs Store DLL
|
| | synccenter.dll | 10.0.14393.0 | Microsoft Sync Center
|
| | synccontroller.dll | 10.0.14393.0 | SyncController for managing sync of mail, contacts, calendar
|
| | synceng.dll | 10.0.14393.0 | Windows Briefcase Engine
|
| | synchostps.dll | 10.0.14393.0 | Proxystub for sync host
|
| | syncinfrastructure.dll | 10.0.14393.0 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 10.0.14393.0 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncproxy.dll | 10.0.14393.0 | SyncProxy for RPC communication about sync of mail, contacts, calendar
|
| | syncreg.dll | 2007.94.14393.0 | Microsoft Synchronization Framework Registration
|
| | syncres.dll | 10.0.14393.0 | ActiveSync Resources
|
| | syncsettings.dll | 10.0.14393.206 | Sync Settings
|
| | syncui.dll | 10.0.14393.0 | Windows Briefcase
|
| | syncutil.dll | 10.0.14393.0 | Sync utilities for mail, contacts, calendar
|
| | syssetup.dll | 10.0.14393.0 | Windows NT System Setup
|
| | systemcpl.dll | 10.0.14393.351 | My System CPL
|
| | systemeventsbrokerclient.dll | 10.0.14393.0 | system Events Broker Client Library
|
| | t2embed.dll | 10.0.14393.0 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 10.0.14393.0 | Microsoft TAPI3
|
| | tapi32.dll | 10.0.14393.0 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 10.0.14393.0 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 10.0.14393.0 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 10.0.14393.0 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 10.0.14393.0 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 10.0.14393.0 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 10.0.14393.0 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 10.0.14393.0 | Task Scheduler COM API
|
| | taskschdps.dll | 10.0.14393.0 | Task Scheduler Interfaces Proxy
|
| | tbauth.dll | 10.0.14393.0 | TBAuth protocol handler
|
| | tbs.dll | 10.0.14393.0 | TBS
|
| | tcpipcfg.dll | 10.0.14393.82 | Network Configuration Objects
|
| | tcpmib.dll | 10.0.14393.0 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 10.0.14393.0 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 10.0.14393.206 | Event Trace Helper Library
|
| | tempsignedlicenseexchangetask.dll | 10.0.14393.206 | TempSignedLicenseExchangeTask Task
|
| | termmgr.dll | 10.0.14393.0 | Microsoft TAPI3 Terminal Manager
|
| | tetheringclient.dll | 10.0.14393.0 | Tethering Client
|
| | textinputframework.dll | 10.0.14393.0 | "TextInputFramework.DYNLINK"
|
| | themecpl.dll | 10.0.14393.447 | Personalization CPL
|
| | themeui.dll | 10.0.14393.0 | Windows Theme API
|
| | threadpoolwinrt.dll | 10.0.14393.0 | Windows WinRT Threadpool
|
| | thumbcache.dll | 10.0.14393.0 | Microsoft Thumbnail Cache
|
| | timedatemuicallback.dll | 10.0.14393.0 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 10.0.14393.0 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tokenbinding.dll | 10.0.14393.0 | Token Binding Protocol
|
| | tokenbroker.dll | 10.0.14393.206 | Token Broker
|
| | tokenbrokerui.dll | 10.0.14393.0 | Token Broker UI
|
| | tpmcertresources.dll | 10.0.14393.0 | TpmCertResources
|
| | tpmcompc.dll | 10.0.14393.0 | Computer Chooser Dialog
|
| | tpmcoreprovisioning.dll | 10.0.14393.206 | TPM Core Provisioning Library
|
| | tquery.dll | 7.0.14393.206 | Microsoft Tripoli Query
|
| | traffic.dll | 10.0.14393.0 | Microsoft Traffic Control 1.0 DLL
|
| | tsbyuv.dll | 10.0.14393.0 | Toshiba Video Codec
|
| | tsgqec.dll | 10.0.14393.0 | RD Gateway QEC
|
| | tsmf.dll | 10.0.14393.206 | RDP MF Plugin
|
| | tspkg.dll | 10.0.14393.447 | Web Service Security Package
|
| | tsworkspace.dll | 10.0.14393.0 | RemoteApp and Desktop Connection Component
|
| | tvratings.dll | 10.0.14393.0 | Module for managing TV ratings
|
| | twext.dll | 10.0.14393.0 | Previous Versions property page
|
| | twinapi.appcore.dll | 10.0.14393.206 | twinapi.appcore
|
| | twinapi.dll | 10.0.14393.447 | twinapi
|
| | twinui.appcore.dll | 10.0.14393.206 | TWINUI.APPCORE
|
| | twinui.dll | 10.0.14393.447 | TWINUI
|
| | txflog.dll | 2001.12.10941.16384 | COM+
|
| | txfw32.dll | 10.0.14393.0 | TxF Win32 DLL
|
| | typelib.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | tzres.dll | 10.0.14393.187 | Time Zones resource DLL
|
| | ucmhc.dll | 10.0.14393.0 | UCM Helper Class
|
| | ucrtbase.dll | 10.0.14393.0 | Microsoft® C Runtime Library
|
| | udhisapi.dll | 10.0.14393.0 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 10.0.14393.0 | eXfat Utility DLL
|
| | ufat.dll | 10.0.14393.0 | FAT Utility DLL
|
| | uianimation.dll | 10.0.14393.447 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.2.14393.206 | Microsoft UI Automation Core
|
| | uicom.dll | 10.0.14393.0 | Add/Remove Modems
|
| | uireng.dll | 10.0.14393.0 | UI Recording Engine Library
|
| | uiribbon.dll | 10.0.14393.0 | Windows Ribbon Framework
|
| | uiribbonres.dll | 10.0.14393.321 | Windows Ribbon Framework Resources
|
| | ulib.dll | 10.0.14393.0 | File Utilities Support DLL
|
| | umdmxfrm.dll | 10.0.14393.0 | Unimodem Tranform Module
|
| | unenrollhook.dll | 10.0.14393.0 | unenrollhook DLL
|
| | unimdmat.dll | 10.0.14393.0 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 10.0.14393.0 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | unistore.dll | 10.0.14393.0 | Unified Store
|
| | untfs.dll | 10.0.14393.0 | NTFS Utility DLL
|
| | updatepolicy.dll | 10.0.14393.351 | Update Policy Reader
|
| | upnp.dll | 10.0.14393.0 | UPnP Control Point API
|
| | upnphost.dll | 10.0.14393.0 | UPnP Device Host
|
| | urefs.dll | 10.0.14393.206 | NTFS Utility DLL
|
| | urefsv1.dll | 10.0.14393.0 | NTFS Utility DLL
|
| | ureg.dll | 10.0.14393.0 | Registry Utility DLL
|
| | url.dll | 11.0.14393.0 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 11.0.14393.447 | OLE32 Extensions for Win32
|
| | usbceip.dll | 10.0.14393.0 | USBCEIP Task
|
| | usbperf.dll | 10.0.14393.0 | USB Performance Objects DLL
|
| | usbui.dll | 10.0.14393.0 | USB UI Dll
|
| | user32.dll | 10.0.14393.351 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 10.0.14393.0 | UserAccountControlSettings
|
| | usercpl.dll | 10.0.14393.447 | User control panel
|
| | userdataaccessres.dll | 10.0.14393.187 | Resource DLL for the UserDataAccess stack
|
| | userdataaccountapis.dll | 10.0.14393.321 | DLL for UserDataAccountsRT
|
| | userdatalanguageutil.dll | 10.0.14393.187 | Language-related helper functions for user data
|
| | userdataplatformhelperutil.dll | 10.0.14393.187 | Platform Utilities for data access
|
| | userdatatimeutil.dll | 10.0.14393.206 | Time-related helper functions for user data
|
| | userdatatypehelperutil.dll | 10.0.14393.187 | Type Utilities for data access
|
| | userdeviceregistration.dll | 10.0.14393.321 | AAD User Device Registration WinRT
|
| | userdeviceregistration.ngc.dll | 10.0.14393.321 | AD/AAD User Device Registration WinRT
|
| | userenv.dll | 10.0.14393.0 | Userenv
|
| | userinitext.dll | 10.0.14393.0 | UserInit Utility Extension DLL
|
| | userlanguageprofilecallback.dll | 10.0.14393.0 | MUI Callback for User Language profile changed
|
| | userlanguagescpl.dll | 10.0.14393.0 | My Languages Configuration Control Panel
|
| | usermgrcli.dll | 10.0.14393.0 | UserMgr API DLL
|
| | usermgrproxy.dll | 10.0.14393.321 | UserMgrProxy
|
| | usoapi.dll | 10.0.14393.0 | Update Session Orchestrator API
|
| | usp10.dll | 10.0.14393.0 | Uniscribe Unicode script processor
|
| | ustprov.dll | 10.0.14393.0 | User State WMI Provider
|
| | utildll.dll | 10.0.14393.0 | WinStation utility support DLL
|
| | uudf.dll | 10.0.14393.0 | UDF Utility DLL
|
| | uxinit.dll | 10.0.14393.0 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 10.0.14393.0 | Setup Wizard Framework
|
| | uxlibres.dll | 10.0.14393.0 | UXLib Resources
|
| | uxtheme.dll | 10.0.14393.0 | Microsoft UxTheme Library
|
| | van.dll | 10.0.14393.0 | View Available Networks
|
| | vault.dll | 10.0.14393.0 | Windows vault Control Panel
|
| | vaultcli.dll | 10.0.14393.0 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbame.dll | 2.0.2.5 | VBA : Middle East Support
|
| | vbscript.dll | 5.812.10240.16384 | Microsoft ® VBScript
|
| | vcamp110.dll | 11.0.51106.1 | Microsoft® C++ AMP Runtime
|
| | vcamp120.dll | 12.0.21005.1 | Microsoft® C++ AMP Runtime
|
| | vcardparser.dll | 10.0.14393.187 | Supports the parsing of VCard and ICal formatted data
|
| | vccorlib110.dll | 11.0.51106.1 | Microsoft ® VC WinRT core library
|
| | vccorlib120.dll | 12.0.21005.1 | Microsoft ® VC WinRT core library
|
| | vcomp100.dll | 10.0.40219.325 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp110.dll | 11.0.51106.1 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp120.dll | 12.0.21005.1 | Microsoft® C/C++ OpenMP Runtime
|
| | vdmdbg.dll | 10.0.14393.0 | VDMDBG.DLL
|
| | vds_ps.dll | 10.0.14393.0 | Microsoft® Virtual Disk Service proxy/stub
|
| | vedatalayerhelpers.dll | 10.0.14393.0 | Visual Element DataLayer Helpers
|
| | veeventdispatcher.dll | 10.0.14393.0 | Visual Element Event dispatcher
|
| | verifier.dll | 10.0.14393.0 | Standard application verifier provider dll
|
| | version.dll | 10.0.14393.0 | Version Checking and File Installation Libraries
|
| | vfwwdm32.dll | 10.0.14393.0 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 10.0.14393.0 | Windows Media Resizer
|
| | virtdisk.dll | 10.0.14393.0 | Virtual Disk API DLL
|
| | voiceactivationmanager.dll | 10.0.14393.0 | Windows Voice Activation Manager
|
| | voiprt.dll | 10.0.14393.0 | Voip Runtime
|
| | vpnikeapi.dll | 10.0.14393.0 | VPN IKE API's
|
| | vscmgrps.dll | 10.0.14393.0 | Microsoft Virtual Smart Card Manager Proxy/Stub
|
| | vss_ps.dll | 10.0.14393.0 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 10.0.14393.0 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 10.0.14393.0 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 10.0.14393.0 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 10.0.14393.0 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 10.0.14393.0 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 10.0.14393.0 | Microsoft Windows Contacts Sync Provider
|
| | walletbackgroundserviceproxy.dll | 10.0.14393.0 | Wallet Background Proxy
|
| | walletproxy.dll | 10.0.14393.0 | Wallet proxy
|
| | wavemsp.dll | 10.0.14393.0 | Microsoft Wave MSP
|
| | wbemcomn.dll | 10.0.14393.0 | WMI
|
| | wcmapi.dll | 10.0.14393.0 | Windows Connection Manager Client API
|
| | wcnapi.dll | 10.0.14393.0 | Windows Connect Now - API Helper DLL
|
| | wcnwiz.dll | 10.0.14393.0 | Windows Connect Now Wizards
|
| | wdc.dll | 10.0.14393.0 | Performance Monitor
|
| | wdi.dll | 10.0.14393.0 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 10.0.14393.0 | Microsoft Digest Access
|
| | wdscore.dll | 10.0.14393.0 | Panther Engine Module
|
| | webcamui.dll | 10.0.14393.187 | Microsoft® Windows® Operating System
|
| | webcheck.dll | 11.0.14393.0 | Web Site Monitor
|
| | webclnt.dll | 10.0.14393.0 | Web DAV Service DLL
|
| | webio.dll | 10.0.14393.206 | Web Transfer Protocols API
|
| | webservices.dll | 10.0.14393.0 | Windows Web Services Runtime
|
| | websocket.dll | 10.0.14393.0 | Web Socket API
|
| | wecapi.dll | 10.0.14393.0 | Event Collector Configuration API
|
| | wer.dll | 10.0.14393.447 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 10.0.14393.0 | WER Diagnostic Controller
|
| | weretw.dll | 10.0.14393.447 | WERETW.DLL
|
| | werui.dll | 10.0.14393.0 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 10.0.14393.5 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 10.0.14393.0 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 10.0.14393.0 | Windows Firewall GPO Helper dll
|
| | wfdprov.dll | 10.0.14393.82 | Private WPS provisioning API DLL for Wi-Fi Direct
|
| | wfhc.dll | 10.0.14393.0 | Windows Firewall Helper Class
|
| | whhelper.dll | 10.0.14393.0 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 10.0.14393.0 | WIA Automation Layer
|
| | wiadefui.dll | 10.0.14393.0 | WIA Scanner Default UI
|
| | wiadss.dll | 10.0.14393.0 | WIA TWAIN compatibility layer
|
| | wiascanprofiles.dll | 10.0.14393.0 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 10.0.14393.0 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 10.0.14393.0 | WIA Tracing
|
| | wifidisplay.dll | 10.0.14393.0 | Wi-Fi Display DLL
|
| | wimgapi.dll | 10.0.14393.0 | Windows Imaging Library
|
| | win32u.dll | 10.0.14393.51 | Win32u
|
| | winbio.dll | 10.0.14393.0 | Windows Biometrics Client API
|
| | winbioext.dll | 10.0.14393.0 | Windows Biometrics Client Extension API
|
| | winbrand.dll | 10.0.14393.0 | Windows Branding Resources
|
| | wincorlib.dll | 10.0.14393.103 | Microsoft Windows ® WinRT core library
|
| | wincredprovider.dll | 10.0.14393.0 | wincredprovider DLL
|
| | wincredui.dll | 10.0.14393.0 | Credential Manager User Internal Interface
|
| | windows.accountscontrol.dll | 10.0.14393.206 | Windows Accounts Control
|
| | windows.applicationmodel.background.systemeventsbroker.dll | 10.0.14393.206 | Windows Background System Events Broker API Server
|
| | windows.applicationmodel.background.timebroker.dll | 10.0.14393.0 | Windows Background Time Broker API Server
|
| | windows.applicationmodel.core.dll | 10.0.14393.206 | Windows Application Model Core API
|
| | windows.applicationmodel.dll | 10.0.14393.206 | Windows ApplicationModel API Server
|
| | windows.applicationmodel.lockscreen.dll | 10.0.14393.447 | Windows Lock Application Framework DLL
|
| | windows.applicationmodel.store.dll | 10.0.14393.321 | Windows Store Runtime DLL
|
| | windows.applicationmodel.store.testingframework.dll | 10.0.14393.82 | Windows Store Testing Framework Runtime DLL
|
| | windows.applicationmodel.wallet.dll | 10.0.14393.321 | Windows ApplicationModel Wallet Runtime DLL
|
| | windows.cortana.proxystub.dll | 10.0.14393.0 | Windows.Cortana.ProxyStub
|
| | windows.data.pdf.dll | 10.0.14393.351 | PDF WinRT APIs
|
| | windows.devices.alljoyn.dll | 10.0.14393.321 | Windows.Devices.AllJoyn DLL
|
| | windows.devices.background.dll | 10.0.14393.0 | Windows.Devices.Background
|
| | windows.devices.background.ps.dll | 10.0.14393.0 | Windows.Devices.Background Interface Proxy
|
| | windows.devices.bluetooth.dll | 10.0.14393.206 | Windows.Devices.Bluetooth DLL
|
| | windows.devices.custom.dll | 10.0.14393.0 | Windows.Devices.Custom
|
| | windows.devices.custom.ps.dll | 10.0.14393.0 | Windows.Devices.Custom Interface Proxy
|
| | windows.devices.enumeration.dll | 10.0.14393.0 | Windows.Devices.Enumeration
|
| | windows.devices.humaninterfacedevice.dll | 10.0.14393.447 | Windows.Devices.HumanInterfaceDevice DLL
|
| | windows.devices.lights.dll | 10.0.14393.0 | Windows Runtime Lights DLL
|
| | windows.devices.lowlevel.dll | 10.0.14393.206 | Windows.Devices.LowLevel DLL
|
| | windows.devices.midi.dll | 10.0.14393.206 | Windows Runtime MIDI Device server DLL
|
| | windows.devices.perception.dll | 10.0.14393.206 | Windows Devices Perception API
|
| | windows.devices.picker.dll | 10.0.14393.206 | Device Picker
|
| | windows.devices.pointofservice.dll | 10.0.14393.206 | Windows Runtime PointOfService DLL
|
| | windows.devices.portable.dll | 10.0.14393.0 | Windows Runtime Portable Devices DLL
|
| | windows.devices.printers.dll | 10.0.14393.0 | Windows Runtime Devices Printers DLL
|
| | windows.devices.printers.extensions.dll | 10.0.14393.0 | Windows.Devices.Printers.Extensions
|
| | windows.devices.radios.dll | 10.0.14393.206 | Windows.Devices.Radios DLL
|
| | windows.devices.scanners.dll | 10.0.14393.206 | Windows Runtime Devices Scanners DLL
|
| | windows.devices.sensors.dll | 10.0.14393.321 | Windows Runtime Sensors DLL
|
| | windows.devices.serialcommunication.dll | 10.0.14393.206 | Windows.Devices.SerialCommunication DLL
|
| | windows.devices.smartcards.dll | 10.0.14393.206 | Windows Runtime Smart Card API DLL
|
| | windows.devices.usb.dll | 10.0.14393.206 | Windows Runtime Usb DLL
|
| | windows.devices.wifi.dll | 10.0.14393.351 | Windows.Devices.WiFi DLL
|
| | windows.devices.wifidirect.dll | 10.0.14393.206 | Windows.Devices.WiFiDirect DLL
|
| | windows.energy.dll | 10.0.14393.206 | Windows Energy Runtime DLL
|
| | windows.gaming.input.dll | 10.0.14393.206 | Windows Gaming Input API
|
| | windows.gaming.preview.dll | 10.0.14393.0 | Windows Gaming API Preview
|
| | windows.gaming.ui.gamebar.dll | 10.0.14393.0 | Windows Gaming UI API GameBar
|
| | windows.gaming.xboxlive.storage.dll | 10.0.14393.206 | Xbox Connected Storage WinRT implementation
|
| | windows.globalization.dll | 10.0.14393.447 | Windows Globalization
|
| | windows.globalization.fontgroups.dll | 10.0.14393.0 | Fonts Mapping API
|
| | windows.globalization.phonenumberformatting.dll | 10.0.14393.0 | Windows Libphonenumber OSS component
|
| | windows.graphics.dll | 10.0.14393.0 | WinRT Windows Graphics DLL
|
| | windows.graphics.printing.3d.dll | 10.0.14393.206 | Microsoft Windows Printing Support
|
| | windows.graphics.printing.dll | 10.0.14393.206 | Microsoft Windows Printing Support
|
| | windows.internal.bluetooth.dll | 10.0.14393.206 | Windows.Internal.Bluetooth DLL
|
| | windows.internal.management.dll | 10.0.14393.206 | Windows Managent Service DLL
|
| | windows.internal.ui.logon.proxystub.dll | 10.0.14393.187 | Logon User Experience Proxy Stub
|
| | windows.management.lockdown.dll | 10.0.14393.0 | Windows Runtime Lockdown Management DLL
|
| | windows.management.workplace.dll | 10.0.14393.0 | Windows Runtime MdmPolicy DLL
|
| | windows.management.workplace.workplacesettings.dll | 10.0.14393.0 | Windows Runtime WorkplaceSettings DLL
|
| | windows.media.audio.dll | 10.0.14393.206 | Windows Runtime Window Media Audio server DLL
|
| | windows.media.backgroundmediaplayback.dll | 10.0.14393.351 | Windows Media BackgroundMediaPlayback DLL
|
| | windows.media.devices.dll | 10.0.14393.0 | Windows Runtime media device server DLL
|
| | windows.media.dll | 10.0.14393.351 | Windows Media Runtime DLL
|
| | windows.media.editing.dll | 10.0.14393.206 | Windows Media Editing DLL
|
| | windows.media.faceanalysis.dll | 10.0.14393.206 | Microsoft (R) Face Detection DLL
|
| | windows.media.import.dll | 10.0.14393.206 | Windows Photo Import API (WinRT/COM)
|
| | windows.media.mediacontrol.dll | 10.0.14393.0 | Windows Runtime MediaControl server DLL
|
| | windows.media.ocr.dll | 10.0.14393.206 | Windows OCR Runtime DLL
|
| | windows.media.playback.backgroundmediaplayer.dll | 10.0.14393.351 | Windows Media Playback BackgroundMediaPlayer DLL
|
| | windows.media.playback.mediaplayer.dll | 10.0.14393.351 | Windows Media Playback MediaPlayer DLL
|
| | windows.media.playback.proxystub.dll | 10.0.14393.0 | BackgroundMediaPlayer Proxy Stub DLL
|
| | windows.media.protection.playready.dll | 10.0.14393.447 | Microsoft PlayReady Client Framework Dll
|
| | windows.media.speech.dll | 10.0.14393.351 | Windows Speech Runtime DLL
|
| | windows.media.speech.uxres.dll | 10.0.14393.67 | Windows Media Speech UX Resources DLL
|
| | windows.media.streaming.dll | 10.0.14393.187 | DLNA DLL
|
| | windows.media.streaming.ps.dll | 10.0.14393.0 | DLNA Proxy-Stub DLL
|
| | windows.networking.backgroundtransfer.backgroundmanagerpolicy.dll | 10.0.14393.0 | Background Transfer Background Manager Policy DLL
|
| | windows.networking.backgroundtransfer.dll | 10.0.14393.321 | Windows.Networking.BackgroundTransfer DLL
|
| | windows.networking.connectivity.dll | 10.0.14393.351 | Windows Networking Connectivity Runtime DLL
|
| | windows.networking.dll | 10.0.14393.351 | Windows.Networking DLL
|
| | windows.networking.hostname.dll | 10.0.14393.321 | Windows.Networking.HostName DLL
|
| | windows.networking.networkoperators.hotspotauthentication.dll | 10.0.14393.0 | Microsoft Windows Hotspot Authentication API
|
| | windows.networking.proximity.dll | 10.0.14393.0 | Windows Runtime Proximity API DLL
|
| | windows.networking.servicediscovery.dnssd.dll | 10.0.14393.321 | Windows.Networking.ServiceDiscovery.Dnssd DLL
|
| | windows.networking.sockets.pushenabledapplication.dll | 10.0.14393.0 | Windows.Networking.Sockets.PushEnabledApplication DLL
|
| | windows.networking.xboxlive.proxystub.dll | 10.0.14393.0 | Windows.Networking.XboxLive Proxy Stub Dll
|
| | windows.perception.stub.dll | |
|
| | windows.security.authentication.identity.provider.dll | 10.0.14393.206 | Secondary Factor Authentication Windows Runtime DLL
|
| | windows.security.authentication.onlineid.dll | 10.0.14393.447 | Windows Runtime OnlineId Authentication DLL
|
| | windows.security.authentication.web.core.dll | 10.0.14393.0 | Token Broker WinRT API
|
| | windows.security.credentials.ui.credentialpicker.dll | 10.0.14393.0 | WinRT Credential Picker Server
|
| | windows.security.credentials.ui.userconsentverifier.dll | 10.0.14393.0 | Windows User Consent Verifier API
|
| | windows.shell.search.urihandler.dll | 10.0.14393.447 | Windows Search URI Handler
|
| | windows.shell.servicehostbuilder.dll | 10.0.14393.0 | Windows.Shell.ServiceHostBuilder
|
| | windows.speech.pal.dll | 10.0.10586.494 | Speech Platform Adaptation Layer DLL
|
| | windows.staterepository.dll | 10.0.14393.321 | Windows StateRepository API Server
|
| | windows.staterepositorybroker.dll | 10.0.14393.0 | Windows StateRepository API Broker
|
| | windows.staterepositoryclient.dll | 10.0.14393.321 | Windows StateRepository API Broker
|
| | windows.storage.applicationdata.dll | 10.0.14393.206 | Windows Application Data API Server
|
| | windows.storage.compression.dll | 5.0.1.1 | WinRT Compression
|
| | windows.storage.dll | 10.0.14393.206 | Microsoft WinRT Storage API
|
| | windows.storage.search.dll | 10.0.14393.0 | Windows.Storage.Search
|
| | windows.system.diagnostics.dll | 10.0.14393.0 | Windows System Diagnostics DLL
|
| | windows.system.launcher.dll | 10.0.14393.0 | Windows.System.Launcher
|
| | windows.system.profile.hardwareid.dll | 10.0.14393.0 | Windows System Profile HardwareId DLL
|
| | windows.system.profile.platformdiagnosticsandusagedatasettings.dll | 10.0.14393.0 | Platform Diagnostics and Usage Settings DLL
|
| | windows.system.profile.retailinfo.dll | 10.0.14393.0 | Windows.System.Profile.RetailInfo Runtime DLL
|
| | windows.system.profile.systemid.dll | 10.0.14393.0 | Windows System Profile SystemId DLL
|
| | windows.system.profile.systemmanufacturers.dll | 10.0.14393.0 | Windows.System.Profile.SystemManufacturers
|
| | windows.system.remotedesktop.dll | 10.0.14393.0 | Windows System RemoteDesktop Runtime DLL
|
| | windows.system.systemmanagement.dll | 10.0.14393.0 | Windows Runtime SystemManagement DLL
|
| | windows.system.userdeviceassociation.dll | 10.0.14393.206 | Windows System User Device Association API
|
| | windows.ui.biofeedback.dll | 10.0.14393.447 | Bio Feedback User Experience
|
| | windows.ui.blockedshutdown.dll | 10.0.14393.447 | Blocked Shutdown User Experience
|
| | windows.ui.core.textinput.dll | 10.0.14393.0 | Windows.UI.Core.TextInput dll
|
| | windows.ui.cred.dll | 10.0.14393.447 | Credential Prompt User Experience
|
| | windows.ui.creddialogcontroller.dll | 10.0.14393.206 | Credential UX Dialog Controller
|
| | windows.ui.dll | 10.0.14393.206 | Windows Runtime UI Foundation DLL
|
| | windows.ui.immersive.dll | 10.0.14393.447 | WINDOWS.UI.IMMERSIVE
|
| | windows.ui.input.inking.dll | 10.0.14393.206 | WinRT Windows Inking DLL
|
| | windows.ui.logon.dll | 10.0.14393.447 | Logon User Experience
|
| | windows.ui.search.dll | 10.0.14393.447 | Windows.UI.Search
|
| | windows.ui.xaml.dll | 10.0.14393.351 | Windows.UI.Xaml dll
|
| | windows.ui.xaml.inkcontrols.dll | 10.0.14393.206 | Windows UI XAML InkControls API
|
| | windows.ui.xaml.maps.dll | 10.0.14393.206 | Windows UI XAML Maps API
|
| | windows.ui.xaml.phone.dll | 10.0.14393.206 | Windows UI XAML Phone API
|
| | windows.ui.xaml.resources.dll | 10.0.14393.351 | Windows.UI.Xaml.Resources dll
|
| | windows.ui.xamlhost.dll | 10.0.14393.0 | XAML Host
|
| | windows.web.diagnostics.dll | 10.0.14393.0 | Windows.Web.Diagnostics
|
| | windows.web.dll | 10.0.14393.321 | Web Client DLL
|
| | windows.web.http.dll | 10.0.14393.321 | Windows.Web.Http DLL
|
| | windowsaccessbridge-32.dll | 8.0.1010.13 | Java(TM) Platform SE binary
|
| | windowscodecs.dll | 10.0.14393.206 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 10.0.14393.0 | Microsoft Windows Codecs Extended Library
|
| | windowscodecsraw.dll | 10.0.14393.0 | Microsoft Camera Codec Pack
|
| | windowslivelogin.dll | 10.0.14393.0 | Microsoft® Account Login Helper
|
| | winfax.dll | 10.0.14393.0 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 10.0.14393.351 | Windows HTTP Services
|
| | winhttpcom.dll | 10.0.14393.0 | Windows COM interface for WinHttp
|
| | wininet.dll | 11.0.14393.447 | Internet Extensions for Win32
|
| | wininetlui.dll | 10.0.14393.447 | Provides legacy UI for wininet
|
| | wininitext.dll | 10.0.14393.0 | WinInit Utility Extension DLL
|
| | winipcfile.dll | 10.0.14393.0 | Microsoft Active Directory Rights Management Services File API
|
| | winipcsecproc.dll | 10.0.14393.0 | Microsoft Active Directory Rights Management Services Desktop Security Processor
|
| | winipsec.dll | 10.0.14393.0 | Windows IPsec SPD Client DLL
|
| | winlangdb.dll | 10.0.14393.0 | Windows Bcp47 Language Database
|
| | winmde.dll | 10.0.14393.351 | WinMDE DLL
|
| | winmm.dll | 10.0.14393.0 | MCI API DLL
|
| | winmmbase.dll | 10.0.14393.0 | Base Multimedia Extension API DLL
|
| | winmsipc.dll | 10.0.14393.0 | Microsoft Active Directory Rights Management Services Client
|
| | winmsoirmprotector.dll | 10.0.14393.0 | Windows Office file format IRM Protector
|
| | winnlsres.dll | 10.0.14393.0 | NLSBuild resource DLL
|
| | winnsi.dll | 10.0.14393.0 | Network Store Information RPC interface
|
| | winopcirmprotector.dll | 10.0.14393.0 | Windows Office file format IRM Protector
|
| | winrnr.dll | 10.0.14393.0 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 10.0.14393.0 | remtsvc
|
| | winrsmgr.dll | 10.0.14393.0 | WSMan Shell API
|
| | winrssrv.dll | 10.0.14393.0 | winrssrv
|
| | winrttracing.dll | 10.0.14393.206 | Windows Diagnostics Tracing
|
| | winsatapi.dll | 10.0.14393.0 | Windows System Assessment Tool API
|
| | winscard.dll | 10.0.14393.0 | Microsoft Smart Card API
|
| | winshfhc.dll | 10.0.14393.0 | File Risk Estimation
|
| | winsku.dll | 10.0.14393.0 | Windows SKU Library
|
| | winsockhc.dll | 10.0.14393.0 | Winsock Network Diagnostic Helper Class
|
| | winsqlite3.dll | 3.12.2.0 | SQLite is a software library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine.
|
| | winsrpc.dll | 10.0.14393.0 | WINS RPC LIBRARY
|
| | winsta.dll | 10.0.14393.0 | Winstation Library
|
| | winsync.dll | 2007.94.14393.0 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.14393.0 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.14393.0 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 10.0.14393.351 | Microsoft Trust Verification APIs
|
| | wintypes.dll | 10.0.14393.351 | Windows Base Types DLL
|
| | winusb.dll | 10.0.14393.0 | Windows USB Driver User Library
|
| | wisp.dll | 10.0.14393.0 | Microsoft Pen and Touch Input Component
|
| | wkscli.dll | 10.0.14393.0 | Workstation Service Client DLL
|
| | wkspbrokerax.dll | 10.0.14393.0 | Microsoft Workspace Broker ActiveX Control
|
| | wksprtps.dll | 10.0.14393.0 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 10.0.14393.82 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 10.0.14393.206 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 10.0.14393.0 | Dot11 Connection Flows
|
| | wlandlg.dll | 10.0.14393.0 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 10.0.14393.0 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 10.0.14393.82 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlanmm.dll | 10.0.14393.0 | Dot11 Media and AdHoc Managers
|
| | wlanpref.dll | 10.0.14393.0 | Wireless Preferred Networks
|
| | wlanui.dll | 10.0.14393.0 | Wireless Profile UI
|
| | wlanutil.dll | 10.0.14393.0 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 10.0.14393.0 | Win32 LDAP API DLL
|
| | wldp.dll | 10.0.14393.0 | Windows Lockdown Policy
|
| | wlgpclnt.dll | 10.0.14393.0 | 802.11 Group Policy Client
|
| | wlidcli.dll | 10.0.14393.0 | Microsoft® Account Dynamic Link Library
|
| | wlidcredprov.dll | 10.0.14393.0 | Microsoft® Account Credential Provider
|
| | wlidfdp.dll | 10.0.14393.0 | Microsoft® Account Function Discovery Provider
|
| | wlidnsp.dll | 10.0.14393.0 | Microsoft® Account Namespace Provider
|
| | wlidprov.dll | 10.0.14393.0 | Microsoft® Account Provider
|
| | wlidres.dll | 10.0.14393.0 | Microsoft® Windows Live ID Resource
|
| | wls0wndh.dll | 10.0.14393.0 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 10.0.14393.0 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 10.0.14393.0 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.14393.0 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 10.0.14393.0 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.14393.0 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.14393.0 | Windows Media Device Manager Proxy Stub
|
| | wmdrmsdk.dll | 10.0.14393.0 | WMDRM backwards compatibility stub
|
| | wmerror.dll | 12.0.14393.0 | Windows Media Error Definitions (English)
|
| | wmi.dll | 10.0.14393.0 | WMI DC and DP functionality
|
| | wmiclnt.dll | 10.0.14393.0 | WMI Client API
|
| | wmidcom.dll | 10.0.14393.0 | WMI
|
| | wmidx.dll | 12.0.14393.0 | Windows Media Indexer DLL
|
| | wmiprop.dll | 10.0.14393.0 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmitomi.dll | 10.0.14393.0 | CIM Provider Adapter
|
| | wmnetmgr.dll | 12.0.14393.0 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.14393.447 | Windows Media Player
|
| | wmpdui.dll | 12.0.14393.0 | Windows Media Player UI Engine
|
| | wmpdxm.dll | 12.0.14393.351 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.14393.351 | Windows Media Player Effects
|
| | wmphoto.dll | 10.0.14393.0 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.14393.82 | Windows Media Player Resources
|
| | wmpmde.dll | 12.0.14393.187 | WMPMDE DLL
|
| | wmpps.dll | 12.0.14393.0 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.14393.351 | Windows Media Player Launcher
|
| | wmsgapi.dll | 10.0.14393.0 | WinLogon IPC Client
|
| | wmspdmod.dll | 10.0.14393.0 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 10.0.14393.0 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.14393.0 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 10.0.14393.0 | Windows Media Video Decoder
|
| | wmvdspa.dll | 10.0.14393.0 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 10.0.14393.0 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 10.0.14393.0 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 10.0.14393.0 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 10.0.14393.0 | Windows Media Video Encoder
|
| | wofutil.dll | 10.0.14393.0 | Windows Overlay File System Filter user mode API
|
| | wordbreakers.dll | 10.0.14393.0 | "WordBreakers.DYNLINK"
|
| | workfoldersres.dll | 6.2.9200.16384 | Work Folders Resources
|
| | wow32.dll | 10.0.14393.0 | Wow32
|
| | wpbcreds.dll | 10.0.14393.0 | WP 8.1 upgrade support utility
|
| | wpc.dll | 10.0.14393.0 | WPC Settings Library
|
| | wpcwebfilter.dll | 10.0.14393.321 | WpcWebFilter.dll
|
| | wpdshext.dll | 10.0.14393.0 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 10.0.14393.0 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 10.0.14393.0 | WMDM Service Provider for Windows Portable Devices
|
| | wpnapps.dll | 10.0.14393.206 | Windows Push Notification Apps
|
| | wpportinglibrary.dll | 10.0.14393.0 | <d> DLL
|
| | ws2_32.dll | 10.0.14393.206 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 10.0.14393.0 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 10.0.14393.0 | Windows Security Center API
|
| | wscinterop.dll | 10.0.14393.0 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 10.0.14393.0 | Windows Security Center ISV API
|
| | wsclient.dll | 10.0.14393.0 | Windows Store Licensing Client
|
| | wscproxystub.dll | 10.0.14393.0 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 10.0.14393.0 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 10.0.14393.0 | WSD Challenge Component
|
| | wsecedit.dll | 10.0.14393.0 | Security Configuration UI Module
|
| | wshbth.dll | 10.0.14393.0 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.812.10240.16384 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 10.0.14393.0 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.812.10240.16384 | Microsoft ® Shell Extension for Windows Script Host
|
| | wshhyperv.dll | 10.0.14393.0 | Hyper-V Winsock2 Helper DLL
|
| | wship6.dll | 10.0.14393.0 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 10.0.14393.0 | Windows Sockets Helper DLL
|
| | wshqos.dll | 10.0.14393.0 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 10.0.14393.0 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 10.0.14393.0 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmagent.dll | 10.0.14393.0 | WinRM Agent
|
| | wsmanmigrationplugin.dll | 10.0.14393.0 | WinRM Migration Plugin
|
| | wsmauto.dll | 10.0.14393.0 | WSMAN Automation
|
| | wsmplpxy.dll | 10.0.14393.0 | wsmplpxy
|
| | wsmres.dll | 10.0.14393.0 | WSMan Resource DLL
|
| | wsmsvc.dll | 10.0.14393.351 | WSMan Service
|
| | wsmwmipl.dll | 10.0.14393.0 | WSMAN WMI Provider
|
| | wsnmp32.dll | 10.0.14393.0 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 10.0.14393.0 | Windows Socket 32-Bit DLL
|
| | wsp_fs.dll | 10.0.14393.351 | Windows Storage Provider for FileShare management
|
| | wsp_health.dll | 10.0.14393.351 | Windows Storage Provider for Health Agent API
|
| | wsp_sr.dll | 10.0.14393.206 | Windows Storage Provider for Storage Replication management
|
| | wtsapi32.dll | 10.0.14393.0 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 10.0.14393.0 | Windows Update Client API
|
| | wudriver.dll | 10.0.14393.0 | Windows Update WUDriver Stub
|
| | wups.dll | 10.0.14393.0 | Windows Update client proxy stub
|
| | wvc.dll | 1.0.0.1 | Windows Visual Components
|
| | wwaapi.dll | 10.0.14393.206 | Microsoft Web Application Host API library
|
| | wwaext.dll | 10.0.14393.0 | Microsoft Web Application Host Extension library
|
| | wwanapi.dll | 10.0.14393.206 | Mbnapi
|
| | wwapi.dll | 10.0.14393.0 | WWAN API
|
| | xaudio2_8.dll | 10.0.14393.0 | XAudio2 Game Audio API
|
| | xaudio2_9.dll | 10.0.14393.0 | XAudio2 Game Audio API
|
| | xblauthmanagerproxy.dll | 10.0.14393.0 | XblAuthManagerProxy
|
| | xblauthtokenbrokerext.dll | 10.0.14393.0 | Xbox Live Token Broker Extension
|
| | xblgamesaveproxy.dll | 10.0.14393.0 | Xbox Live Game Save Service Proxies and Stubs
|
| | xinput1_4.dll | 10.0.14393.0 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 10.0.14393.0 | XNA Common Controller
|
| | xinputuap.dll | 10.0.14393.0 | Microsoft Common Controller API
|
| | xmlfilter.dll | 2008.0.14393.0 | XML Filter
|
| | xmllite.dll | 10.0.14393.0 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 10.0.14393.0 | Network Provisioning Service Client API
|
| | xmlrw.dll | 2.0.3609.0 | Microsoft XML Slim Library
|
| | xmlrwbin.dll | 2.0.3609.0 | Microsoft XML Slim Library
|
| | xolehlp.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsdocumenttargetprint.dll | 10.0.14393.0 | XPS DocumentTargetPrint DLL
|
| | xpsfilt.dll | 10.0.14393.0 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 10.0.14393.0 | XPS to GDI Converter
|
| | xpsprint.dll | 10.0.14393.0 | XPS Printing DLL
|
| | xpsrasterservice.dll | 10.0.14393.0 | XPS Rasterization Service Component
|
| | xpsservices.dll | 10.0.14393.0 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 10.0.14393.0 | OPC Shell Metadata Handler
|
| | xwizards.dll | 10.0.14393.0 | Extensible Wizards Manager Module
|
| | xwreg.dll | 10.0.14393.0 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 10.0.14393.0 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 10.0.14393.0 | Extensible Wizard Type Plugin for Win32
|
| | zipcontainer.dll | 10.0.14393.0 | Zip Container DLL
|
| | zipfldr.dll | 10.0.14393.447 | Compressed (zipped) Folders
|
| | ztrace_maps.dll | 10.0.14393.0 | ZTrace Event Resources
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Error | None | 2017-01-15 10:37:07 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x8007139F Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | 3 | 2017-01-15 10:46:52 | | DbxSvc | 320: Failed to connect to the driver: (-2147024894) The system cannot find the file specified.
|
| | Application | Error | 3 | 2017-01-15 10:50:31 | | DbxSvc | 320: Failed to connect to the driver: (-2147024894) The system cannot find the file specified.
|
| | Application | Error | None | 2017-01-15 10:50:38 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Error | None | 2017-01-15 10:50:38 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | 3 | 2017-01-15 10:57:23 | | DbxSvc | 320: Failed to connect to the driver: (-2147024894) The system cannot find the file specified.
|
| | Application | Error | None | 2017-01-15 10:57:33 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Error | None | 2017-01-15 10:57:34 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | 3 | 2017-01-15 11:09:23 | | DbxSvc | 320: Failed to connect to the driver: (-2147024894) The system cannot find the file specified.
|
| | Application | Error | None | 2017-01-15 11:09:33 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x8007139F Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Warning | None | 2017-01-15 11:09:35 | SYSTEM | Microsoft-Windows-User Profiles Service | 1534: Profile notification of event Create for component {2c86c843-77ae-4284-9722-27d65366543c} failed, error code is Not implemented .
|
| | Application | Error | None | 2017-01-15 11:09:36 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Error | None | 2017-01-15 11:24:36 | | SideBySide | 33: Activation context generation failed for "c:\program files (x86)\avg\setup\avgntdumpx.exe". Dependent Assembly AVG.VC140.CRT,processorArchitecture="x86",publicKeyToken="f92d94485545da78",type="win32",version="14.0.23918.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:45 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:45 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:45 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:45 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:51 | | SideBySide | 33: Activation context generation failed for "C:\WINDOWS\Temp\AvgSetup\a193d94b-cce9-47cf-8a8d-4162723965c8\install\fmw\avgrdsttesta.exe". Dependent Assembly AVG.VC140.CRT,processorArchitecture="amd64",publicKeyToken="f92d94485545da78",type="win32",version="14.0.23918.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-15 11:24:53 | | SideBySide | 33: Activation context generation failed for "C:\WINDOWS\Temp\AvgSetup\a193d94b-cce9-47cf-8a8d-4162723965c8\install\fmw\avgrdsttestx.exe". Dependent Assembly AVG.VC140.CRT,processorArchitecture="x86",publicKeyToken="f92d94485545da78",type="win32",version="14.0.23918.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Windows\explorer.exe' (pid 5556) cannot be restarted - 1.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'C:\Program Files (x86)\AVG\Av\avgui.exe' (pid 7800) cannot be restarted - 1.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'D:\Program Files (x86)\GarenaLoLLCUVN\GameData\Apps\LoLLCUVN\LeagueClient\LeagueClient.exe' (pid 5256) cannot be restarted - 1.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'D:\Program Files (x86)\GarenaLoLLCUVN\GameData\Apps\LoLLCUVN\LeagueClient\LeagueClientUx.exe' (pid 9636) cannot be restarted - 1.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'D:\Program Files (x86)\GarenaLoLLCUVN\GameData\Apps\LoLLCUVN\LeagueClient\LeagueClientUx.exe' (pid 3464) cannot be restarted - 1.
|
| | Application | Warning | None | 2017-01-15 11:26:42 | SYSTEM | Microsoft-Windows-RestartManager | 10010: Application 'D:\Program Files (x86)\GarenaLoLLCUVN\GameData\Apps\LoLLCUVN\LeagueClient\LeagueClientUx.exe' (pid 7580) cannot be restarted - 1.
|
| | Application | Error | None | 2017-01-15 13:21:21 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-15 13:30:15 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-15 21:14:25 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x80072EE7 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-15 21:14:27 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-16 20:11:14 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:11:14 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:11:14 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:11:14 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:11:15 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-16 20:11:15 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=2
|
| | Application | Error | None | 2017-01-16 20:15:15 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:15:15 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:15:15 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:15:15 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:46:55 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:46:55 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:46:55 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 20:46:55 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 21:06:49 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 21:06:49 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 21:06:49 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 21:06:49 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-16 23:26:19 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x8007139F Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-17 18:18:59 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=2
|
| | Application | Error | None | 2017-01-17 18:18:59 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-17 18:19:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-17 18:19:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-17 18:19:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-17 18:19:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-17 18:22:31 | | Perflib | 1008: The Open Procedure for service "BITS" in DLL "C:\Windows\System32\bitsperf.dll" failed. Performance data for this service will not be available. The first four bytes (DWORD) of the Data section contains the error code.
|
| | Application | Error | None | 2017-01-18 15:05:55 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x8007139F Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-18 15:06:14 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Error | None | 2017-01-18 15:33:58 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-18 17:16:47 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x803F7001 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2017-01-18 17:57:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\mmsBundle.dll". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-18 17:57:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\ManagementConsole.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-18 17:57:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\RecoveryExpert.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Application | Error | None | 2017-01-18 17:57:59 | | SideBySide | 33: Activation context generation failed for "C:\Program Files (x86)\Common Files\Acronis\DiskDirector\WinPE\Files\systeminfo.exe". Dependent Assembly Microsoft.VC80.CRT,processorArchitecture="x86",type="win32",version="8.0.50727.762" could not be found. Please use sxstrace.exe for detailed diagnosis.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:41 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x234 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:41 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-15 10:36:41 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:48 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x294 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:48 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x29c New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x300 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x308 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x310 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x300 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x354 New Process Name: ????????????????-??6??8?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x308 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x35c New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x308 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2017-01-15 10:36:50 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xee15
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x15a8d Linked Logon ID: 0x15aa9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x15aa9 Linked Logon ID: 0x15a8d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x15a8d Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x15aa9 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 101 | 2017-01-15 10:36:52 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x39984 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x398 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5fc Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5fc Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xd9c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xd9c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12290 | 2017-01-15 10:37:01 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:37:01 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\7092289d2be9a3ebf1065d0f1c678ab6_e8d761b7-8a68-4187-8c95-75a3788ac267 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2017-01-15 10:37:06 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:37:06 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\7092289d2be9a3ebf1065d0f1c678ab6_e8d761b7-8a68-4187-8c95-75a3788ac267 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2017-01-15 10:37:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:37:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:37:39 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:37:44 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x398 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:39:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:39:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 10:39:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:39:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 10:39:56 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1058 Process Name: C:\Windows\System32\CompatTelRunner.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:44:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:44:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:47:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:47:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 10:47:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:47:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:47:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 10:47:20 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x984bb5
|
| | Security | Audit Success | 13568 | 2017-01-15 10:47:20 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x984bb5
|
| | Security | Audit Success | 13824 | 2017-01-15 10:47:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x398 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:47:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:47:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-15 10:47:25 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x9c834b
|
| | Security | Audit Success | 13568 | 2017-01-15 10:47:25 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x14b8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x9c834b
|
| | Security | Audit Success | 103 | 2017-01-15 10:47:32 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:20 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x234 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-15 10:50:20 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:27 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x294 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:27 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2a0 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x304 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x30c New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x294 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x314 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x358 New Process Name: ????????????????-??6??c?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x30c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x360 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x30c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2017-01-15 10:50:29 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xbff2
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12c43 Linked Logon ID: 0x12c60 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12c60 Linked Logon ID: 0x12c43 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3a8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12c43 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12c60 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x2e9bb Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1f0 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f4 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f4 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:34 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5445b Linked Logon ID: 0x548c4 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 Linked Logon ID: 0x5445b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5445b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:36 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1194 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:36 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1194 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12290 | 2017-01-15 10:50:37 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:50:37 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\7092289d2be9a3ebf1065d0f1c678ab6_e8d761b7-8a68-4187-8c95-75a3788ac267 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2017-01-15 10:50:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:50:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2017-01-15 10:50:38 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:50:38 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\7092289d2be9a3ebf1065d0f1c678ab6_e8d761b7-8a68-4187-8c95-75a3788ac267 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:50:41 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:51:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1e94 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:52:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1240 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 12290 | 2017-01-15 10:52:31 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:52:31 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Key File Operation Information: File Path: C:\WINDOWS\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4189c412-eeaf-4ea6-82d0-0f5f64531f8a Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:52:31 | | Microsoft-Windows-Security-Auditing | 5059: Key migration operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Additional Information: Operation: %%2464 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2017-01-15 10:52:40 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1240 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:53:03 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1240 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:53:03 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1240 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:54:49 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x548c4 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x215c Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:08 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x238 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-15 10:57:08 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:09 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x260 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:19 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2a8 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:19 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2b0 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x2a8 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x314 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x31c New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x2a8 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x324 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x314 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3cc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13cf6 Linked Logon ID: 0x13d18 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3cc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13d18 Linked Logon ID: 0x13cf6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3cc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13cf6 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x13d18 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x368 New Process Name: ????????????????-??6??c?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x31c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x378 New Process Name: ????????????????-??6??c?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x31c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x388 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x31c Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2017-01-15 10:57:22 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xceea
|
| | Security | Audit Success | 101 | 2017-01-15 10:57:23 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x618 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:23 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x618 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x2d45a Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x40c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:24 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xf6c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xf6c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:27 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Linked Logon ID: 0x71b54 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 Linked Logon ID: 0x716da Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:27 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:38 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:39 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:39 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1374 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:39 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1374 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:46 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1dd0 Process Name: C:\Windows\System32\dllhost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:46 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1dd0 Process Name: C:\Windows\System32\dllhost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:48 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:57:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 10:57:53 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x1bbb0a
|
| | Security | Audit Success | 13568 | 2017-01-15 10:57:53 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1e80 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x1bbb0a
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:57:59 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4720: A user account was created. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da New Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Attributes: SAM Account Name: Draku Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 Allowed To Delegate To: - Old UAC Value: 0x0 New UAC Value: 0x15 User Account Control: %%2080 %%2082 %%2084 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges -
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4722: A user account was enabled. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Changed Attributes: SAM Account Name: Draku Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x15 New UAC Value: 0x14 User Account Control: %%2048 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Changed Attributes: SAM Account Name: Draku Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 1/15/2017 10:58:20 AM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x14 User Account Control: - User Parameters: - SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4724: An attempt was made to reset an account's password. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Changed Attributes: SAM Account Name: - Display Name: - User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Changed Attributes: SAM Account Name: Draku Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 1/15/2017 10:58:20 AM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x214 User Account Control: %%2089 User Parameters: - SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4724: An attempt was made to reset an account's password. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Target Account: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4728: A member was added to a security-enabled global group. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Member: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: - Group: Security ID: S-1-5-21-5413862-739192754-441069123-513 Group Name: None Group Domain: DESKTOP-8V8TQ92 Additional Information: Privileges: - Expiration time: (null)
|
| | Security | Audit Success | 13826 | 2017-01-15 10:58:20 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Member: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: - Expiration time: (null)
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1584 Process Name: C:\Windows\System32\SystemSettingsAdminFlows.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1584 Process Name: C:\Windows\System32\SystemSettingsAdminFlows.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1584 Process Name: C:\Windows\System32\SystemSettingsAdminFlows.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1c94 Process Name: C:\Windows\ImmersiveControlPanel\SystemSettings.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 10:58:29 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da Member: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: - Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Additional Information: Privileges: - Expiration time: (null)
|
| | Security | Audit Success | 12290 | 2017-01-15 10:58:35 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:58:35 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Key File Operation Information: File Path: C:\WINDOWS\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4189c412-eeaf-4ea6-82d0-0f5f64531f8a Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 10:58:35 | | Microsoft-Windows-Security-Auditing | 5059: Key migration operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Additional Information: Operation: %%2464 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1374 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1374 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:58:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1374 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:59:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1dd0 Process Name: C:\Windows\System32\dllhost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:59:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1dd0 Process Name: C:\Windows\System32\dllhost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:59:06 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x716da User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1dd0 Process Name: C:\Windows\System32\dllhost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 10:59:55 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x71b54 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1704 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:03:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:03:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x44c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:04:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:04:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:04:37 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1894 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:04:37 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1894 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:06:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x368 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:06:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:17 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x238 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-15 11:09:17 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:18 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:19 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x284 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:19 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x290 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2fc New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x238 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x304 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x30c New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x2fc Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x350 New Process Name: ????????????????-??6??4?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x360 New Process Name: ????????????????-??6??4?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-15 11:09:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x370 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 101 | 2017-01-15 11:09:22 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11650 Linked Logon ID: 0x11678 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11678 Linked Logon ID: 0x11650 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11650 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11678 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-15 11:09:22 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xaa9e
|
| | Security | Audit Success | 12292 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x5f4 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:23 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x5f4 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x2b207 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x8 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:24 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xe5c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:25 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xe5c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8235 Linked Logon ID: 0xa8300 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Linked Logon ID: 0xa8235 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8235 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:34 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:09:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:09:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:09:35 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 11:09:36 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0xc5c4d
|
| | Security | Audit Success | 13568 | 2017-01-15 11:09:36 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0xc5c4d
|
| | Security | Audit Success | 13826 | 2017-01-15 11:10:32 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:10:32 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:39 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x2bae17
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:39 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x2bae17
|
| | Security | Audit Success | 12544 | 2017-01-15 11:11:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:11:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:41 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x2d7c11
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:41 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x2d7c11
|
| | Security | Audit Success | 12290 | 2017-01-15 11:11:43 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: RSA Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 11:11:43 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 510a38ec-b74c-f087-969f-826bc0f2d9aa Key Type: %%2500 Key File Operation Information: File Path: C:\ProgramData\Microsoft\Crypto\SystemKeys\7092289d2be9a3ebf1065d0f1c678ab6_e8d761b7-8a68-4187-8c95-75a3788ac267 Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12290 | 2017-01-15 11:11:44 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 11:11:44 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Key File Operation Information: File Path: C:\WINDOWS\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4189c412-eeaf-4ea6-82d0-0f5f64531f8a Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-15 11:11:44 | | Microsoft-Windows-Security-Auditing | 5059: Key migration operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Additional Information: Operation: %%2464 Return Code: 0x0
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:53 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x3b45a4
|
| | Security | Audit Success | 13568 | 2017-01-15 11:11:53 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x7a8 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x3b45a4
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:11:57 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x18ac Process Name: C:\Windows\System32\SettingSyncHost.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:12:45 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x2320 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 13824 | 2017-01-15 11:14:01 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 11:14:01 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: DefaultAccount Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 11:14:01 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Guest Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 11:14:01 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Oscar Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-15 11:14:01 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: postgres Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13826 | 2017-01-15 11:18:07 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:18:07 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:19:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:19:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-15 11:20:40 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x2678 Process Name: C:\Users\Draku\AppData\Local\CocCoc\Browser\Application\browser.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:22:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:22:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x2a6c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:22:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x2a6c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2017-01-15 11:23:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:23:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 11:23:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:23:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 11:26:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:07 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x982e9e
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:07 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x982e9e
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:08 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x98db10
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:08 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x98db10
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:09 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x997d5f
|
| | Security | Audit Success | 13568 | 2017-01-15 11:26:09 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x997d5f
|
| | Security | Audit Success | 12544 | 2017-01-15 11:27:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:27:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-15 11:27:47 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0xb6ae76
|
| | Security | Audit Success | 13568 | 2017-01-15 11:27:47 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x99c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0xb6ae76
|
| | Security | Audit Success | 12544 | 2017-01-15 11:43:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 11:43:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 12:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 12:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 12:12:48 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13568 | 2017-01-15 12:12:49 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x13f3199
|
| | Security | Audit Success | 13568 | 2017-01-15 12:12:49 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x2610 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x13f3199
|
| | Security | Audit Success | 12544 | 2017-01-15 12:24:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 12:24:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 13:09:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 13:09:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 13:21:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 13:21:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 13:30:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 13:30:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 13:49:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 13:49:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 14:17:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 14:17:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 14:29:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 14:29:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 14:36:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 14:36:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 14:57:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 14:57:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 15:23:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 15:23:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 15:54:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 15:54:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 16:01:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 16:01:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 16:10:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 16:10:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 16:22:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 16:22:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 16:59:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 16:59:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 17:10:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 17:10:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 17:18:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 17:18:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 17:38:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 17:38:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 18:08:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 18:08:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 19:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 19:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 19:29:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 19:29:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 19:37:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 19:37:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 19:43:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 19:43:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 19:50:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 19:50:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 21:09:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 21:09:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 23:09:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 23:09:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2017-01-15 23:36:50 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0xa8300 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12544 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0xda8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x227a45c Linked Logon ID: 0x227a472 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xda8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x227a472 Linked Logon ID: 0x227a45c Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xda8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11678 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11650 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x227a45c Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 23:36:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x227a472 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12544 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-15 23:36:54 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13824 | 2017-01-16 20:10:58 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1208 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2017-01-16 20:10:58 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1208 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13568 | 2017-01-16 20:10:59 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x229c08a
|
| | Security | Audit Success | 13568 | 2017-01-16 20:10:59 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x229c08a
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:11:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 20:11:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:10 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85c5 Linked Logon ID: 0x22f85fd Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Linked Logon ID: 0x22f85c5 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:11:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85c5 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:11 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x22fca81
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:11 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x22fca81
|
| | Security | Audit Success | 13826 | 2017-01-16 20:11:11 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x444 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:21 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23712bb
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:21 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23712bb
|
| | Security | Audit Success | 12544 | 2017-01-16 20:11:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:11:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:27 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23bebda
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:27 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23bebda
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:28 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23c11a0
|
| | Security | Audit Success | 13568 | 2017-01-16 20:11:28 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x1008 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x23c11a0
|
| | Security | Audit Success | 13824 | 2017-01-16 20:12:10 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x231c Process Name: C:\Users\Draku\AppData\Local\CocCoc\Browser\Application\browser.exe
|
| | Security | Audit Success | 13824 | 2017-01-16 20:14:01 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xd24 Process Name: C:\Windows\System32\CompatTelRunner.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 20:14:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:14:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 20:16:16 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x160c Process Name: C:\Users\Draku\AppData\Local\CocCoc\Browser\Application\browser.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 20:40:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:40:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 20:46:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-16 20:46:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: DefaultAccount Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-16 20:46:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Guest Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-16 20:46:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Oscar Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-16 20:46:12 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: postgres Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 12544 | 2017-01-16 20:46:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 20:46:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 20:49:15 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x27e8 Process Name: C:\Program Files\WinRAR\WinRAR.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 21:06:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 21:06:36 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 21:07:42 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85c5 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x134c Process Name: C:\Program Files (x86)\R-Drive Image\R-DriveImage.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 21:07:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 21:07:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-16 21:08:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 21:08:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-16 21:08:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 21:08:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 21:09:00 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85c5 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x2b40 Process Name: C:\Program Files (x86)\R-Drive Image\R-DriveImage.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 22:58:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 22:58:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2017-01-16 23:18:30 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2017-01-16 23:18:30 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x22f85fd This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x234 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-16 23:26:11 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:12 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x250 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:13 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x284 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:13 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x28c New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2f8 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x300 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x308 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x2f8 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x34c New Process Name: ????????????????-??6??0?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x300 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x354 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x300 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2017-01-16 23:26:15 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xa891
|
| | Security | Audit Success | 12292 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11365 Linked Logon ID: 0x11382 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11382 Linked Logon ID: 0x11365 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3b4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11365 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11382 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x28312 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x21c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x21c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13826 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x61c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x61c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-16 23:26:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:23 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0xd10 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x608ba Linked Logon ID: 0x608de Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xd10 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-16 23:26:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x608de Linked Logon ID: 0x608ba Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xd10 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x608ba Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-16 23:26:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x608de Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 13824 | 2017-01-17 18:18:51 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xd58 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2017-01-17 18:18:51 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xd58 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2017-01-17 18:18:53 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11382 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2017-01-17 18:18:53 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x11365 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ab64 Linked Logon ID: 0x7ac6b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Linked Logon ID: 0x7ab64 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ab64 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x4d0 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x500 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x510 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_macromed_flash_853cbcf10f17f618.cdf-ms Handle ID: 0x498 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x500 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_macromed_flash_5ff3bc7496f0271e.cdf-ms Handle ID: 0x510 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Macromed\Flash\activex.vch Handle ID: 0x498 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Macromed\Flash\Flash.ocx Handle ID: 0x500 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Macromed\Flash\FlashUtil_ActiveX.dll Handle ID: 0x434 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Macromed\Flash\FlashUtil_ActiveX.exe Handle ID: 0x510 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\Macromed\Flash\activex.vch Handle ID: 0x4f0 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\Macromed\Flash\Flash.ocx Handle ID: 0x50c Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\Macromed\Flash\FlashUtil_ActiveX.dll Handle ID: 0x498 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\Macromed\Flash\FlashUtil_ActiveX.exe Handle ID: 0x510 Process Information: Process ID: 0xbb8 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.350_none_43278ee965418581\TiWorker.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:55 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:56 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbbc Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x144c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:18:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x144c Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:19:02 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 18:19:02 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2017-01-17 18:19:12 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xd44 Process Name: C:\Windows\System32\CompatTelRunner.exe
|
| | Security | Audit Success | 13824 | 2017-01-17 18:19:49 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1b70 Process Name: C:\Users\Draku\AppData\Local\CocCoc\Browser\Application\browser.exe
|
| | Security | Audit Success | 12544 | 2017-01-17 18:20:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:20:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1a64 Process Name: C:\Program Files\WinRAR\WinRAR.exe
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Administrator Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: DefaultAccount Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Guest Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: Oscar Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 13824 | 2017-01-17 18:20:37 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b Additional Information: Caller Workstation: DESKTOP-8V8TQ92 Target Account Name: postgres Target Account Domain: DESKTOP-8V8TQ92
|
| | Security | Audit Success | 12290 | 2017-01-17 18:20:41 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-17 18:20:41 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Key File Operation Information: File Path: C:\WINDOWS\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4189c412-eeaf-4ea6-82d0-0f5f64531f8a Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-17 18:20:41 | | Microsoft-Windows-Security-Auditing | 5059: Key migration operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Additional Information: Operation: %%2464 Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2017-01-17 18:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-17 18:22:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 18:22:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 18:22:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 18:22:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-17 19:08:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 19:08:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:27:50 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1f30 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:28:05 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-17 22:28:05 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x41c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-17 22:28:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x34c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-17 22:28:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2017-01-17 22:28:09 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x7ac6b This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 103 | 2017-01-17 22:28:11 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:48 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x234 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2017-01-18 15:05:48 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x250 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x284 New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x290 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:51 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2fc New Process Name: ??????????????-??6??4?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x234 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:51 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x304 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x284 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:51 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x30c New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x2fc Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3a4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x110fc Linked Logon ID: 0x1111d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3a4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1111d Linked Logon ID: 0x110fc Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3a4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x110fc Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1111d Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x350 New Process Name: ????????????????-??6??4?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x358 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x304 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2017-01-18 15:05:52 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0xa73b
|
| | Security | Audit Success | 12292 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x27be5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x61c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x61c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:05:53 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2017-01-18 15:05:54 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:05:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:05:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-18 15:05:54 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 15:05:54 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x2c4 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 15:06:12 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:06:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Linked Logon ID: 0x54585 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:06:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x54585 Linked Logon ID: 0x5454c Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-8V8TQ92 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:06:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 15:06:12 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1098 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:06:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x1098 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:06:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:06:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x430 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12290 | 2017-01-18 15:06:58 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-18 15:06:58 | | Microsoft-Windows-Security-Auditing | 5058: Key file operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Key File Operation Information: File Path: C:\WINDOWS\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4189c412-eeaf-4ea6-82d0-0f5f64531f8a Operation: %%2458 Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2017-01-18 15:06:58 | | Microsoft-Windows-Security-Auditing | 5059: Key migration operation. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: ECDSA_P256 Key Name: Microsoft Connected Devices Platform device certificate Key Type: %%2500 Additional Information: Operation: %%2464 Return Code: 0x0
|
| | Security | Audit Success | 13824 | 2017-01-18 15:08:37 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x54585 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x163c Process Name: C:\Users\Draku\AppData\Local\CocCoc\Browser\Application\browser.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 15:08:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:08:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-18 15:08:58 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1cdc Process Name: C:\Windows\System32\CompatTelRunner.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 15:08:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:08:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 15:17:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:17:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 15:20:03 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xbc4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 15:33:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 15:33:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 16:47:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 16:47:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 16:47:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x154c Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 16:59:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 16:59:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:14:17 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x18b4 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 17:15:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 17:15:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2017-01-18 17:16:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 17:16:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-18 17:16:50 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x54585 User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0x1f84 Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
| | Security | Audit Success | 12544 | 2017-01-18 17:56:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x8554fe Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: IOQFTSTKCCC7RO4 Source Network Address: 192.168.1.199 Source Port: 49162 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 17:56:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x85551f Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: IOQFTSTKCCC7RO4 Source Network Address: 192.168.1.199 Source Port: 49163 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2017-01-18 17:56:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x85553d Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: IOQFTSTKCCC7RO4 Source Network Address: 192.168.1.199 Source Port: 49164 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2017-01-18 17:56:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x8554fe Logon Type: 3 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2017-01-18 17:56:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x85553d Logon Type: 3 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2017-01-18 17:56:17 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x85551f Logon Type: 3 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12544 | 2017-01-18 17:57:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-8V8TQ92$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x350 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2017-01-18 17:57:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-500 Account Name: Administrator Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-501 Account Name: Guest Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-503 Account Name: DefaultAccount Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1001 Account Name: Oscar Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1002 Account Name: postgres Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13824 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c User: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-579 Group Name: Access Control Assistance Operators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-578 Group Name: Hyper-V Administrators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | Security | Audit Success | 13826 | 2017-01-18 17:58:18 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-5413862-739192754-441069123-1003 Account Name: Draku Account Domain: DESKTOP-8V8TQ92 Logon ID: 0x5454c Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0xfcc Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Extreme\aida64.exe
|
| | System | Error | None | 2017-01-15 10:36:37 | SYSTEM | Microsoft-Windows-Kernel-Boot | 29: The system cannot write to the specified device.
|
| | System | Warning | None | 2017-01-15 10:36:39 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-15 10:36:42 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Warning | None | 2017-01-15 10:36:42 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-15 10:36:52 | | EventLog | 6008: The previous system shutdown at 4:21:57 PM on ?11/?24/?2016 was unexpected.
|
| | System | Warning | None | 2017-01-15 10:36:52 | | Service Control Manager | 7039: A service process other than the one launched by the Service Control Manager connected when starting the iThemes5 service. The Service Control Manager launched process 1632 and process 1668 connected instead. Note that if this service is configured to start under a debugger, this behavior is expected.
|
| | System | Error | None | 2017-01-15 10:36:53 | | Service Control Manager | 7000: The Quoteex service failed to start due to the following error: %%2
|
| | System | Warning | None | 2017-01-15 10:37:00 | SYSTEM | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications. Please visit http://support.microsoft.com/kb/197571 for more information.
|
| | System | Error | None | 2017-01-15 10:37:07 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2017-01-15 10:47:24 | | Service Control Manager | 7006: The ScRegSetValueExW call failed for FailureActions with the following error: %%5
|
| | System | Warning | None | 2017-01-15 10:50:11 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-15 10:50:21 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Warning | None | 2017-01-15 10:50:21 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Warning | None | 2017-01-15 10:50:30 | | Service Control Manager | 7039: A service process other than the one launched by the Service Control Manager connected when starting the iThemes5 service. The Service Control Manager launched process 1752 and process 1788 connected instead. Note that if this service is configured to start under a debugger, this behavior is expected.
|
| | System | Warning | 212 | 2017-01-15 10:50:30 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device SWD\WPDBUSENUM\_??_USBSTOR#Disk&Ven_Kingston&Prod_DataTraveler_3.0&Rev_PMAP#D067E51599A7B03106085116&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}.
|
| | System | Error | None | 2017-01-15 10:50:31 | | Service Control Manager | 7000: The Quoteex service failed to start due to the following error: %%2
|
| | System | Error | None | 2017-01-15 10:50:37 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Warning | None | 2017-01-15 10:50:39 | SYSTEM | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications. Please visit http://support.microsoft.com/kb/197571 for more information.
|
| | System | Error | None | 2017-01-15 10:51:14 | | Service Control Manager | 7034: The iThemes5 service terminated unexpectedly. It has done this 1 time(s).
|
| | System | Error | None | 2017-01-15 10:57:22 | | EventLog | 6008: The previous system shutdown at 10:50:30 AM on ?1/?15/?2017 was unexpected.
|
| | System | Warning | None | 2017-01-15 11:09:08 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Warning | None | 2017-01-15 11:09:18 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-15 11:09:22 | | EventLog | 6008: The previous system shutdown at 10:57:22 AM on ?1/?15/?2017 was unexpected.
|
| | System | Error | None | 2017-01-15 11:09:22 | | Service Control Manager | 7003: The Themes service depends on the following service: iThemes5. This service might not be installed.
|
| | System | Error | None | 2017-01-15 11:09:23 | | BugCheck | 1001: The computer has rebooted from a bugcheck. The bugcheck was: 0x00000109 (0xa39fe95eb952482b, 0x0000000000000000, 0x0000000000000000, 0x0000000000000108). A dump was saved in: C:\WINDOWS\MEMORY.DMP. Report Id: 6b592149-346c-4f5d-bec2-20ea14a111e7.
|
| | System | Error | None | 2017-01-15 11:09:23 | | Service Control Manager | 7000: The Quoteex service failed to start due to the following error: %%2
|
| | System | Error | None | 2017-01-15 11:09:25 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The exact nature of the corruption is unknown. The file system structures need to be scanned online.
|
| | System | Warning | None | 2017-01-15 11:09:31 | SYSTEM | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications. Please visit http://support.microsoft.com/kb/197571 for more information.
|
| | System | Error | None | 2017-01-15 11:09:33 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Error | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Error | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Error | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Error | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-15 11:09:34 | SYSTEM | Ntfs | 132: Too many repair events have occurred in a short period of time. Temporarily suspending posting of further repair events.
|
| | System | Error | None | 2017-01-15 11:09:36 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0xa000000009b12. The name of the file is "<unable to determine file name>".
|
| | System | Error | None | 2017-01-15 11:09:36 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0xd000000009d8a. The name of the file is "<unable to determine file name>".
|
| | System | Error | None | 2017-01-15 11:09:36 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0xe000000009d9f. The name of the file is "<unable to determine file name>".
|
| | System | Error | None | 2017-01-15 11:09:36 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0x9000000009da0. The name of the file is "<unable to determine file name>".
|
| | System | Error | None | 2017-01-15 11:09:36 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0x1d000000009da2. The name of the file is "<unable to determine file name>".
|
| | System | Error | None | 2017-01-15 11:11:36 | SYSTEM | DCOM | 10010: The server {B8FC52F5-CB03-4E10-8BCB-E3EC794C54A5} did not register with DCOM within the required timeout.
|
| | System | Warning | None | 2017-01-15 11:11:38 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Error | None | 2017-01-15 11:11:39 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0x10000000134b4. The name of the file is "\Program Files\WindowsApps\Microsoft.WindowsMaps_4.1509.50911.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\MapsSmallTile.scale-100.png".
|
| | System | Warning | None | 2017-01-15 11:11:40 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Error | None | 2017-01-15 11:11:41 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. The Master File Table (MFT) contains a corrupted file record. The file reference number is 0x10000000134ca. The name of the file is "\Program Files\WindowsApps\Microsoft.WindowsMaps_4.1509.50911.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\MapsWideTile.scale-100.png".
|
| | System | Error | None | 2017-01-15 11:11:42 | Draku | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {260EB9DE-5CBE-4BFF-A99A-3710AF55BF1E} and APPID {260EB9DE-5CBE-4BFF-A99A-3710AF55BF1E} to the user DESKTOP-8V8TQ92\Draku SID (S-1-5-21-5413862-739192754-441069123-1003) from address LocalHost (Using LRPC) running in the application container Microsoft.Windows.ShellExperienceHost_10.0.14393.447_neutral_neutral_cw5n1h2txyewy SID (S-1-15-2-155514346-2573954481-755741238-1654018636-1233331829-3075935687-2861478708). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2017-01-15 11:18:54 | Draku | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {9E175B6D-F52A-11D8-B9A5-505054503030} and APPID {9E175B9C-F52A-11D8-B9A5-505054503030} to the user DESKTOP-8V8TQ92\Draku SID (S-1-5-21-5413862-739192754-441069123-1003) from address LocalHost (Using LRPC) running in the application container Microsoft.MicrosoftEdge_38.14393.0.0_neutral__8wekyb3d8bbwe SID (S-1-15-2-3624051433-2125758914-1423191267-1740899205-1073925389-3782572162-737981194). This security permission can be modified using the Component Services administrative tool.
|
| | System | Warning | None | 2017-01-15 12:09:08 | | disk | 52: The driver has detected that device \Device\Harddisk0\DR0 has predicted that it will fail. Immediately back up your data and replace your hard disk drive. A failure may be imminent.
|
| | System | Error | None | 2017-01-15 12:12:48 | SYSTEM | Ntfs | 131: The file system structure on volume C: cannot be corrected. Please run the chkdsk utility on the volume C:.
|
| | System | Warning | None | 2017-01-15 12:12:52 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Error | None | 2017-01-15 13:16:54 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-15 13:28:56 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Warning | 1014 | 2017-01-15 13:33:53 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name arc.msn.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2017-01-15 13:40:54 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-15 22:22:59 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Warning | None | 2017-01-16 20:10:59 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Error | None | 2017-01-16 20:11:00 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Warning | None | 2017-01-16 20:11:00 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:02 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 130: The file system structure on volume C: has now been repaired.
|
| | System | Warning | None | 2017-01-16 20:11:04 | SYSTEM | Ntfs | 132: Too many repair events have occurred in a short period of time. Temporarily suspending posting of further repair events.
|
| | System | Error | None | 2017-01-16 20:11:11 | SYSTEM | Microsoft-Windows-Kernel-General | 5: Access is denied.
|
| | System | Error | None | 2017-01-16 20:11:22 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-16 20:11:23 | | volsnap | 23: There was insufficient disk space on volume \\?\Volume{9f491023-0000-0000-0000-100000000000} to create the shadow copy of volume F:. Shadow copy storage creation failed.
|
| | System | Error | None | 2017-01-16 20:11:23 | SYSTEM | Microsoft-Windows-Ntfs | 98:
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041cf6. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\Images\Ratings". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041cf9. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Car\LTR". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041cfc. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Car\RTL". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d01. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Car\LTR". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d04. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Car\RTL". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d08. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Home\LTR". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x4000000041d0b. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Home\RTL". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d0f. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Place\LTR". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d12. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Place\RTL". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:27 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d16. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Work\LTR". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:28 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d19. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Directions\Work\RTL". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:28 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d1c. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Home". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:11:28 | SYSTEM | Ntfs | 55: A corruption was discovered in the file system structure on volume C:. A corruption was found in a file system index structure. The file reference number is 0x3000000041d1f. The name of the file is "\Program Files\WindowsApps\Deleted\Microsoft.WindowsMaps_5.1609.2651.0_neutral_split.scale-100_8wekyb3d8bbweaf05a952-7fc1-42fd-93b5-7e5db3a2ea96\Assets\SecondaryTiles\Place". The corrupted index attribute is ":$I30:$INDEX_ALLOCATION".
|
| | System | Error | None | 2017-01-16 20:21:06 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-16 23:26:16 | | Service Control Manager | 7003: The Themes service depends on the following service: iThemes5. This service might not be installed.
|
| | System | Warning | 212 | 2017-01-16 23:26:16 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device SWD\WPDBUSENUM\_??_USBSTOR#Disk&Ven_Kingston&Prod_DataTraveler_3.0&Rev_PMAP#D067E51599A7B03106085116&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}.
|
| | System | Error | None | 2017-01-16 23:26:17 | | Service Control Manager | 7000: The Quoteex service failed to start due to the following error: %%2
|
| | System | Error | None | 2017-01-16 23:26:19 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Warning | None | 2017-01-16 23:26:25 | SYSTEM | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications. Please visit http://support.microsoft.com/kb/197571 for more information.
|
| | System | Warning | None | 2017-01-17 18:18:52 | | disk | 52: The driver has detected that device \Device\Harddisk0\DR0 has predicted that it will fail. Immediately back up your data and replace your hard disk drive. A failure may be imminent.
|
| | System | Error | None | 2017-01-17 18:18:58 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | 1 | 2017-01-17 18:21:15 | SYSTEM | Microsoft-Windows-WindowsUpdateClient | 20: Installation Failure: Windows failed to install the following update with error 0x800b0100: Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB3213986).
|
| | System | Error | None | 2017-01-17 18:26:42 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-17 20:02:52 | | NetBT | 4321: The name "WORKGROUP :1d" could not be registered on the interface with IP address 192.168.1.81. The computer with the IP address 192.168.1.199 did not allow the name to be claimed by this computer.
|
| | System | Error | None | 2017-01-17 20:15:16 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-17 21:27:25 | | bowser | 8003: The master browser has received a server announcement from the computer IOQFTSTKCCC7RO4 that believes that it is the master browser for the domain on transport NetBT_Tcpip_{A2A24C2B-0EF7-4193-83E2-A87EE803825C}. The master browser is stopping or an election is being forced.
|
| | System | Error | None | 2017-01-18 15:05:52 | | Service Control Manager | 7003: The Themes service depends on the following service: iThemes5. This service might not be installed.
|
| | System | Warning | 212 | 2017-01-18 15:05:52 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device SWD\WPDBUSENUM\_??_USBSTOR#Disk&Ven_Kingston&Prod_DataTraveler_3.0&Rev_PMAP#D067E51599A7B03106085116&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}.
|
| | System | Error | None | 2017-01-18 15:05:53 | | Service Control Manager | 7000: The Quoteex service failed to start due to the following error: %%2
|
| | System | Error | None | 2017-01-18 15:05:54 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Warning | None | 2017-01-18 15:06:02 | SYSTEM | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications. Please visit http://support.microsoft.com/kb/197571 for more information.
|
| | System | Error | 1 | 2017-01-18 15:20:10 | SYSTEM | Microsoft-Windows-WindowsUpdateClient | 20: Installation Failure: Windows failed to install the following update with error 0x800b0100: Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB3213986).
|
| | System | Warning | None | 2017-01-18 16:05:54 | | disk | 52: The driver has detected that device \Device\Harddisk0\DR0 has predicted that it will fail. Immediately back up your data and replace your hard disk drive. A failure may be imminent.
|
| | System | Warning | 1014 | 2017-01-18 16:42:55 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.youtube.com timed out after none of the configured DNS servers responded.
|
| | System | Error | None | 2017-01-18 16:49:43 | | volsnap | 36: The shadow copies of volume D: were aborted because the shadow copy storage could not grow due to a user imposed limit.
|
| | System | Warning | 1014 | 2017-01-18 17:16:43 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.googleapis.com timed out after none of the configured DNS servers responded.
|