| | | |
|
| | DLL File | Version | Description
|
| | aaclient.dll | 6.1.7601.17514 | Anywhere access client
|
| | accessibilitycpl.dll | 6.1.7601.17514 | Ease of access control panel
|
| | acctres.dll | 6.1.7600.16385 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 6.1.7600.16385 | Access Control List Editor
|
| | aclui.dll | 6.1.7600.16385 | Security Descriptor Editor
|
| | acppage.dll | 6.1.7601.17514 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 6.1.7601.17514 | Action Center
|
| | actioncentercpl.dll | 6.1.7601.17514 | Action Center Control Panel
|
| | activeds.dll | 6.1.7601.17514 | ADs Router Layer DLL
|
| | actxprxy.dll | 6.1.7601.17514 | ActiveX Interface Marshaling Library
|
| | admparse.dll | 8.0.7600.16385 | IEAK Global Policy Template Parser
|
| | admtmpl.dll | 6.1.7601.17514 | Administrative Templates Extension
|
| | adprovider.dll | 6.1.7600.16385 | adprovider DLL
|
| | adsldp.dll | 6.1.7601.17514 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 6.1.7600.16385 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 6.1.7600.16385 | ADs LDAP Provider DLL
|
| | adsnt.dll | 6.1.7600.16385 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 6.1.7600.16385 | Security Audit Schema DLL
|
| | advapi32.dll | 6.1.7601.17514 | Advanced Windows 32 Base API
|
| | advpack.dll | 8.0.7600.16385 | ADVPACK
|
| | aecache.dll | 6.1.7600.16385 | AECache Sysprep Plugin
|
| | aeevts.dll | 6.1.7600.16385 | Application Experience Event Resources
|
| | alttab.dll | 6.1.7600.16385 | Windows Shell Alt Tab
|
| | amstream.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | amxread.dll | 6.1.7600.16385 | API Tracing Manifest Read Library
|
| | apds.dll | 6.1.7600.16385 | Microsoft® Help Data Services Module
|
| | apilogen.dll | 6.1.7600.16385 | API Tracing Log Engine
|
| | api-ms-win-core-console-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-datetime-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-debug-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-delayload-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-errorhandling-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-fibers-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-handle-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-heap-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-interlocked-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-io-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-libraryloader-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-localregistry-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-memory-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-misc-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-namedpipe-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-processenvironment-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-processthreads-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-profile-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-rtlsupport-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-string-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-synch-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-sysinfo-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-util-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-core-xstate-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-security-base-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-security-lsalookup-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-security-sddl-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-core-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l2-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-winsvc-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | apircl.dll | 6.1.7600.16385 | Microsoft® InfoTech IR Local DLL
|
| | apisetschema.dll | 6.1.7600.16385 | ApiSet Schema DLL
|
| | apphelp.dll | 6.1.7601.17514 | Application Compatibility Client Library
|
| | apphlpdm.dll | 6.1.7600.16385 | Application Compatibility Help Module
|
| | appidapi.dll | 6.1.7600.16385 | Application Identity APIs Dll
|
| | appidpolicyengineapi.dll | 6.1.7600.16385 | AppId Policy Engine API Module
|
| | appmgmts.dll | 6.1.7600.16385 | Software installation Service
|
| | appmgr.dll | 6.1.7601.17514 | Software Installation Snapin Extenstion
|
| | apss.dll | 6.1.7600.16385 | Microsoft® InfoTech Storage System Library
|
| | asferror.dll | 12.0.7600.16385 | ASF Error Definitions
|
| | asycfilt.dll | 6.1.7601.17514 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atmfd.dll | 5.1.2.230 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.230 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 6.1.7601.17514 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 6.1.7600.16385 | Audio Engine
|
| | audiokse.dll | 6.1.7600.16385 | Audio Ks Endpoint
|
| | audioses.dll | 6.1.7601.17514 | Audio Session
|
| | auditnativesnapin.dll | 6.1.7600.16385 | Audit Policy Group Policy Editor Extension
|
| | auditpolicygpinterop.dll | 6.1.7600.16385 | Audit Policy GP Module
|
| | auditpolmsg.dll | 6.1.7600.16385 | Audit Policy MMC SnapIn Messages
|
| | authfwcfg.dll | 6.1.7600.16385 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 6.1.7600.16385 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 6.1.7601.17514 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 6.1.7600.16385 | Wizard Framework
|
| | authui.dll | 6.1.7601.17514 | Windows Authentication UI
|
| | authz.dll | 6.1.7600.16385 | Authorization Framework
|
| | autoplay.dll | 6.1.7601.17514 | AutoPlay Control Panel
|
| | auxiliarydisplayapi.dll | 6.1.7600.16385 | Microsoft Windows SideShow API
|
| | auxiliarydisplaycpl.dll | 6.1.7601.17514 | Microsoft Windows SideShow Control Panel
|
| | avicap32.dll | 6.1.7600.16385 | AVI Capture window class
|
| | avifil32.dll | 6.1.7601.17514 | Microsoft AVI File support library
|
| | avrt.dll | 6.1.7600.16385 | Multimedia Realtime Runtime
|
| | azroles.dll | 6.1.7601.17514 | azroles Module
|
| | azroleui.dll | 6.1.7601.17514 | Authorization Manager
|
| | azsqlext.dll | 6.1.7601.17514 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | basecsp.dll | 6.1.7601.17514 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 6.1.7601.17514 | Battery Meter Helper DLL
|
| | bcrypt.dll | 6.1.7600.16385 | Windows Cryptographic Primitives Library (Wow64)
|
| | bcryptprimitives.dll | 6.1.7600.16385 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 6.1.7600.16385 | Bidispl DLL
|
| | biocredprov.dll | 6.1.7600.16385 | WinBio Credential Provider
|
| | bitsperf.dll | 7.5.7601.17514 | Perfmon Counter Access
|
| | bitsprx2.dll | 7.5.7600.16385 | Background Intelligent Transfer Service Proxy
|
| | bitsprx3.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 2.0 Proxy
|
| | bitsprx4.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 2.5 Proxy
|
| | bitsprx5.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 3.0 Proxy
|
| | bitsprx6.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 4.0 Proxy
|
| | blackbox.dll | 11.0.7601.17514 | BlackBox DLL
|
| | bootvid.dll | 6.1.7600.16385 | VGA Boot Driver
|
| | browcli.dll | 6.1.7601.17514 | Browser Service Client DLL
|
| | browseui.dll | 6.1.7601.17514 | Shell Browser UI Library
|
| | btpanui.dll | 6.1.7600.16385 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | bwunpairelevated.dll | 6.1.7600.16385 | BWUnpairElevated Proxy Dll
|
| | c_g18030.dll | 6.1.7600.16385 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_is2022.dll | 6.1.7600.16385 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 6.1.7601.17514 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 6.1.7601.17514 | Microsoft® Cabinet File API
|
| | cabview.dll | 6.1.7601.17514 | Cabinet File Viewer Shell Extension
|
| | capiprovider.dll | 6.1.7600.16385 | capiprovider DLL
|
| | capisp.dll | 6.1.7600.16385 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 6.6.7601.17514 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.7601.17514 | Microsoft CDO for Windows Library
|
| | certcli.dll | 6.1.7601.17514 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 6.1.7600.16385 | Cert Credential Provider
|
| | certenc.dll | 6.1.7600.16385 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 6.1.7601.17514 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 6.1.7600.16385 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 6.1.7601.17514 | Certificates snap-in
|
| | certpoleng.dll | 6.1.7601.17514 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.7600.16385 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 6.1.7600.16385 | Configuration Backend Interface
|
| | cfgmgr32.dll | 6.1.7601.17514 | Configuration Manager DLL
|
| | chsbrkr.dll | 6.1.7600.16385 | Simplified Chinese Word Breaker
|
| | chtbrkr.dll | 6.1.7600.16385 | Chinese Traditional Word Breaker
|
| | chxreadingstringime.dll | 6.1.7600.16385 | CHxReadingStringIME
|
| | cic.dll | 6.1.7600.16385 | CIC - MMC controls for Taskpad
|
| | clb.dll | 6.1.7600.16385 | Column List Box
|
| | clbcatq.dll | 2001.12.8530.16385 | COM+ Configuration Catalog
|
| | clfsw32.dll | 6.1.7600.16385 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 6.1.7600.16385 | SQL Client Configuration Utility DLL
|
| | clusapi.dll | 6.1.7601.17514 | Cluster API Library
|
| | cmcfg32.dll | 7.2.7600.16385 | Microsoft Connection Manager Configuration Dll
|
| | cmdial32.dll | 7.2.7600.16385 | Microsoft Connection Manager
|
| | cmicryptinstall.dll | 6.1.7600.16385 | Installers for cryptographic elements of CMI objects
|
| | cmifw.dll | 6.1.7600.16385 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 6.1.7600.16385 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.7600.16385 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.7600.16385 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.7600.16385 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.7600.16385 | Microsoft Connection Manager Utility Lib
|
| | cngaudit.dll | 6.1.7600.16385 | Windows Cryptographic Next Generation audit library
|
| | cngprovider.dll | 6.1.7600.16385 | cngprovider DLL
|
| | cnvfat.dll | 6.1.7600.16385 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.8530.16385 | COM+
|
| | colorcnv.dll | 6.1.7600.16385 | Windows Media Color Conversion
|
| | colorui.dll | 6.1.7600.16385 | Microsoft Color Control Panel
|
| | comcat.dll | 6.1.7600.16385 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.7601.17514 | User Experience Controls Library
|
| | comdlg32.dll | 6.1.7601.17514 | Common Dialogs DLL
|
| | compobj.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | compstui.dll | 6.1.7600.16385 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.8530.16385 | COM+
|
| | comres.dll | 2001.12.8530.16385 | COM+ Resources
|
| | comsnap.dll | 2001.12.8530.16385 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.8530.16385 | COM+ Services
|
| | comuid.dll | 2001.12.8530.16385 | COM+ Explorer UI
|
| | connect.dll | 6.1.7600.16385 | Get Connected Wizards
|
| | console.dll | 6.1.7600.16385 | Control Panel Console Applet
|
| | corpol.dll | 8.0.7600.16385 | Microsoft COM Runtime Execution Engine
|
| | cpfilters.dll | 6.6.7601.17514 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credssp.dll | 6.1.7601.17514 | Credential Delegation Security Package
|
| | credui.dll | 6.1.7601.17514 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 6.1.7601.17514 | Crypto API32
|
| | cryptbase.dll | 6.1.7600.16385 | Base cryptographic API DLL
|
| | cryptdlg.dll | 6.1.7600.16385 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 6.1.7600.16385 | Cryptography Manager
|
| | cryptext.dll | 6.1.7600.16385 | Crypto Shell Extensions
|
| | cryptnet.dll | 6.1.7600.16385 | Crypto Network Related API
|
| | cryptsp.dll | 6.1.7600.16385 | Cryptographic Service Provider API
|
| | cryptsvc.dll | 6.1.7601.17514 | Cryptographic Services
|
| | cryptui.dll | 6.1.7601.17514 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 6.1.7600.16385 | XML DigSig API
|
| | cscapi.dll | 6.1.7601.17514 | Offline Files Win32 API
|
| | cscdll.dll | 6.1.7601.17514 | Offline Files Temporary Shim
|
| | cscobj.dll | 6.1.7601.17514 | In-proc COM object used by clients of CSC API
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 6.1.7601.17514 | Microsoft D2D Library
|
| | d3d10.dll | 6.1.7600.16385 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 6.1.7600.16385 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 6.1.7601.17514 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 6.1.7600.16385 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 6.1.7601.17514 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 6.1.7601.17514 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 6.1.7601.17514 | Direct3D 11 Runtime
|
| | d3d8.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3d8thk.dll | 6.1.7600.16385 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 6.1.7601.17514 | Direct3D 9 Runtime
|
| | d3dim.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dim700.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dramp.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dxof.dll | 6.1.7600.16385 | DirectX Files DLL
|
| | dataclen.dll | 6.1.7600.16385 | Disk Space Cleaner for Windows
|
| | davclnt.dll | 6.1.7601.17514 | Web DAV Client DLL
|
| | davhlpr.dll | 6.1.7600.16385 | DAV Helper DLL
|
| | dbgeng.dll | 6.1.7601.17514 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 6.1.7601.17514 | Windows Image Helper
|
| | dbnetlib.dll | 6.1.7600.16385 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 6.1.7600.16385 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 6.1.7600.16385 | DCI Manager
|
| | ddaclsys.dll | 6.1.7600.16385 | SysPrep module for Reseting Data Drive ACL
|
| | ddoiproxy.dll | 6.1.7600.16385 | DDOI Interface Proxy
|
| | ddores.dll | 6.1.7600.16385 | Device Category information and resources
|
| | ddraw.dll | 6.1.7600.16385 | Microsoft DirectDraw
|
| | ddrawex.dll | 6.1.7600.16385 | Direct Draw Ex
|
| | defaultlocationcpl.dll | 6.1.7601.17514 | Default Location Control Panel
|
| | deskadp.dll | 6.1.7600.16385 | Advanced display adapter properties
|
| | deskmon.dll | 6.1.7600.16385 | Advanced display monitor properties
|
| | deskperf.dll | 6.1.7600.16385 | Advanced display performance properties
|
| | devenum.dll | 6.6.7600.16385 | Device enumeration.
|
| | devicecenter.dll | 6.1.7601.17514 | Device Center
|
| | devicedisplaystatusmanager.dll | 6.1.7600.16385 | Device Display Status Manager
|
| | devicemetadataparsers.dll | 6.1.7600.16385 | Common Device Metadata parsers
|
| | devicepairing.dll | 6.1.7600.16385 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 6.1.7601.17514 | Device Pairing Folder
|
| | devicepairinghandler.dll | 6.1.7600.16385 | Device Pairing Handler Dll
|
| | devicepairingproxy.dll | 6.1.7600.16385 | Device Pairing Proxy Dll
|
| | deviceuxres.dll | 6.1.7600.16385 | Windows Device User Experience Resource File
|
| | devmgr.dll | 6.1.7600.16385 | Device Manager MMC Snapin
|
| | devobj.dll | 6.1.7600.16385 | Device Information Set DLL
|
| | devrtl.dll | 6.1.7600.16385 | Device Management Run Time Library
|
| | dfscli.dll | 6.1.7600.16385 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 4.0.40305.0 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 6.1.7600.16385 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 6.1.7600.16385 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 6.1.7601.17514 | DHCP Client Service
|
| | dhcpcore6.dll | 6.1.7600.16385 | DHCPv6 Client
|
| | dhcpcsvc.dll | 6.1.7600.16385 | DHCP Client Service
|
| | dhcpcsvc6.dll | 6.1.7600.16385 | DHCPv6 Client
|
| | dhcpqec.dll | 6.1.7600.16385 | Microsoft DHCP NAP Enforcement Client
|
| | dhcpsapi.dll | 6.1.7600.16385 | DHCP Server API Stub DLL
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 6.1.7600.16385 | DIMS Job DLL
|
| | dimsroam.dll | 6.1.7600.16385 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 6.1.7600.16385 | Microsoft DirectInput
|
| | dinput8.dll | 6.1.7600.16385 | Microsoft DirectInput
|
| | directdb.dll | 6.1.7600.16385 | Microsoft Direct Database API
|
| | diskcopy.dll | 6.1.7600.16385 | Windows DiskCopy
|
| | dispex.dll | 5.8.7600.16385 | Microsoft ® DispEx
|
| | display.dll | 6.1.7601.17514 | Display Control Panel
|
| | dmband.dll | 6.1.7600.16385 | Microsoft DirectMusic Band
|
| | dmcompos.dll | 6.1.7600.16385 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 6.1.7600.16385 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 6.1.7600.16385 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 6.1.7600.16385 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 6.1.7600.16385 | Disk Management Snap-in Resources
|
| | dmime.dll | 6.1.7600.16385 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 6.1.7600.16385 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 6.1.7600.16385 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 6.1.7600.16385 | TreeView OCX
|
| | dmrc.dll | 6.1.7600.16385 | Windows MRC
|
| | dmscript.dll | 6.1.7600.16385 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 6.1.7600.16385 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 6.1.7600.16385 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 6.1.7600.16385 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 6.1.7600.16385 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 6.1.7600.16385 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 6.1.7601.17514 | DNS Client API DLL
|
| | dnscmmc.dll | 6.1.7601.17514 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 6.1.7600.16385 | OLE DocFile Property Page
|
| | dot3api.dll | 6.1.7601.17514 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 6.1.7601.17514 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 6.1.7600.16385 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 6.1.7600.16385 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 6.1.7600.16385 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 6.1.7600.16385 | Dot3 Helper Class
|
| | dot3msm.dll | 6.1.7601.17514 | 802.3 Media Specific Module
|
| | dot3ui.dll | 6.1.7601.17514 | 802.3 Advanced UI
|
| | dpapiprovider.dll | 6.1.7600.16385 | dpapiprovider DLL
|
| | dplayx.dll | 6.1.7600.16385 | Microsoft DirectPlay
|
| | dpmodemx.dll | 6.1.7600.16385 | Modem and Serial Connection For DirectPlay
|
| | dpnaddr.dll | 6.1.7601.17514 | Microsoft DirectPlay8 Address
|
| | dpnathlp.dll | 6.1.7600.16385 | Microsoft DirectPlay NAT Helper UPnP
|
| | dpnet.dll | 6.1.7600.16385 | Microsoft DirectPlay
|
| | dpnhpast.dll | 6.1.7600.16385 | Microsoft DirectPlay NAT Helper PAST
|
| | dpnhupnp.dll | 6.1.7600.16385 | Microsoft DirectPlay NAT Helper UPNP
|
| | dpnlobby.dll | 6.1.7600.16385 | Microsoft DirectPlay8 Lobby
|
| | dpwsockx.dll | 6.1.7600.16385 | Internet TCP/IP and IPX Connection For DirectPlay
|
| | dpx.dll | 6.1.7601.17514 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.7601.17514 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.7600.16385 | DRMv2 Client DLL
|
| | drprov.dll | 6.1.7600.16385 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 6.1.7600.16385 | Distributed Routing Table
|
| | drtprov.dll | 6.1.7600.16385 | Distributed Routing Table Providers
|
| | drttransport.dll | 6.1.7600.16385 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 6.1.7601.17514 | Driver Store API
|
| | ds32gt.dll | 6.1.7600.16385 | ODBC Driver Setup Generic Thunk
|
| | dsauth.dll | 6.1.7601.17514 | DS Authorization for Services
|
| | dsdmo.dll | 6.1.7600.16385 | DirectSound Effects
|
| | dshowrdpfilter.dll | 1.0.0.0 | RDP Renderer Filter (redirector)
|
| | dskquota.dll | 6.1.7600.16385 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 6.1.7601.17514 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 6.1.7600.16385 | DirectSound
|
| | dsprop.dll | 6.1.7600.16385 | Windows Active Directory Property Pages
|
| | dsquery.dll | 6.1.7600.16385 | Directory Service Find
|
| | dsrole.dll | 6.1.7600.16385 | DS Role Client DLL
|
| | dssec.dll | 6.1.7600.16385 | Directory Service Security UI
|
| | dssenh.dll | 6.1.7600.16385 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsuiext.dll | 6.1.7601.17514 | Directory Service Common UI
|
| | dswave.dll | 6.1.7600.16385 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 6.1.7600.16385 | Detection and Sharing Status API
|
| | dui70.dll | 6.1.7600.16385 | Windows DirectUI Engine
|
| | duser.dll | 6.1.7600.16385 | Windows DirectUser Engine
|
| | dwmapi.dll | 6.1.7600.16385 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 6.1.7601.17514 | Microsoft DWM Core Library
|
| | dwrite.dll | 6.1.7601.17514 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 6.1.7601.17514 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 6.1.7601.17514 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.7601.17514 | Microsoft Windows Media Component Removal File.
|
| | dxptaskringtone.dll | 6.1.7601.17514 | Microsoft Ringtone Editor
|
| | dxptasksync.dll | 6.1.7601.17514 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 8.0.7600.16385 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 8.0.7600.16385 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 6.1.7600.16385 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 6.1.7601.17514 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 6.1.7600.16385 | Eap Peer Config
|
| | eappgnui.dll | 6.1.7601.17514 | EAP Generic UI
|
| | eapphost.dll | 6.1.7601.17514 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 6.1.7600.16385 | Microsoft EAPHost Peer Client DLL
|
| | eapqec.dll | 6.1.7600.16385 | Microsoft EAP NAP Enforcement Client
|
| | efsadu.dll | 6.1.7600.16385 | File Encryption Utility
|
| | efscore.dll | 6.1.7601.17514 | EFS Core Library
|
| | efsutil.dll | 6.1.7600.16385 | EFS Utility Library
|
| | ehstorapi.dll | 6.1.7601.17514 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 6.1.7600.16385 | Windows Enhanced Storage Password Manager
|
| | ehstorshell.dll | 6.1.7600.16385 | Windows Enhanced Storage Shell Extension DLL
|
| | els.dll | 6.1.7600.16385 | Event Viewer Snapin
|
| | elscore.dll | 6.1.7600.16385 | Els Core Platform DLL
|
| | elslad.dll | 6.1.7600.16385 | ELS Language Detection
|
| | elstrans.dll | 6.1.7601.17514 | ELS Transliteration Service
|
| | encapi.dll | 6.1.7600.16385 | Encoder API
|
| | encdec.dll | 6.6.7601.17514 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 6.1.7600.16385 | EQoS Snapin extension
|
| | es.dll | 2001.12.8530.16385 | COM+
|
| | esent.dll | 6.1.7601.17514 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 6.1.7600.16385 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | eventcls.dll | 6.1.7600.16385 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 6.1.7601.17514 | Enhanced Video Renderer DLL
|
| | explorerframe.dll | 6.1.7601.17514 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | f3ahvoas.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | faultrep.dll | 6.1.7601.17514 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 6.1.7600.16385 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 6.1.7600.16385 | Bluetooth Provider Proxy Dll
|
| | fde.dll | 6.1.7601.17514 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 6.1.7601.17514 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 6.1.7600.16385 | Pnp Provider Dll
|
| | fdproxy.dll | 6.1.7600.16385 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 6.1.7600.16385 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 6.1.7600.16385 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 6.1.7600.16385 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 6.1.7600.16385 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 6.1.7600.16385 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 6.1.7600.16385 | Services and Shared Folders
|
| | findnetprinters.dll | 6.1.7600.16385 | Find Network Printers COM Component
|
| | firewallapi.dll | 6.1.7600.16385 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 6.1.7601.17514 | Windows Firewall Control Panel
|
| | fltlib.dll | 6.1.7600.16385 | Filter Library
|
| | fmifs.dll | 6.1.7600.16385 | FM IFS Utility DLL
|
| | fms.dll | 1.1.6000.16384 | Font Management Services
|
| | fontext.dll | 6.1.7601.17514 | Windows Font Folder
|
| | fontsub.dll | 6.1.7601.17514 | Font Subsetting DLL
|
| | fphc.dll | 6.1.7601.17514 | Filtering Platform Helper Class
|
| | framedyn.dll | 6.1.7601.17514 | WMI SDK Provider Framework
|
| | framedynos.dll | 6.1.7601.17514 | WMI SDK Provider Framework
|
| | fthsvc.dll | 6.1.7600.16385 | Microsoft Windows Fault Tolerant Heap Diagnostic Module
|
| | fundisc.dll | 6.1.7600.16385 | Function Discovery Dll
|
| | fwcfg.dll | 6.1.7600.16385 | Windows Firewall Configuration Helper
|
| | fwpuclnt.dll | 6.1.7601.17514 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 6.1.7600.16385 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 6.1.7600.16385 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 6.1.7600.16385 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 6.1.7600.16385 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 6.1.7600.16385 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 6.1.7600.16385 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 6.1.7600.16385 | Microsoft Fax Transport Provider
|
| | gameux.dll | 6.1.7601.17514 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gcdef.dll | 6.1.7600.16385 | Game Controllers Default Sheets
|
| | gdi32.dll | 6.1.7601.17514 | GDI Client DLL
|
| | getuname.dll | 6.1.7600.16385 | Unicode name Dll for UCE
|
| | glmf32.dll | 6.1.7600.16385 | OpenGL Metafiling DLL
|
| | glu32.dll | 6.1.7600.16385 | OpenGL Utility Library DLL
|
| | gpapi.dll | 6.1.7600.16385 | Group Policy Client API
|
| | gpedit.dll | 6.1.7600.16385 | GPEdit
|
| | gpprefcl.dll | 6.1.7601.17514 | Group Policy Preference Client
|
| | gpprnext.dll | 6.1.7600.16385 | Group Policy Printer Extension
|
| | gpscript.dll | 6.1.7600.16385 | Script Client Side Extension
|
| | gptext.dll | 6.1.7600.16385 | GPTExt
|
| | hbaapi.dll | 6.1.7601.17514 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 6.1.7600.16385 | Action Center Providers
|
| | helppaneproxy.dll | 6.1.7600.16385 | Microsoft® Help Proxy
|
| | hgcpl.dll | 6.1.7601.17514 | HomeGroup Control Panel
|
| | hhsetup.dll | 6.1.7600.16385 | Microsoft® HTML Help
|
| | hid.dll | 6.1.7600.16385 | Hid User Library
|
| | hidserv.dll | 6.1.7600.16385 | HID Service
|
| | hlink.dll | 6.1.7600.16385 | Microsoft Office 2000 component
|
| | hnetcfg.dll | 6.1.7600.16385 | Home Networking Configuration Manager
|
| | hnetmon.dll | 6.1.7600.16385 | Home Networking Monitor DLL
|
| | httpapi.dll | 6.1.7601.17514 | HTTP Protocol Stack API
|
| | htui.dll | 6.1.7600.16385 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 6.1.7600.16385 | Network Policy Server
|
| | iasacct.dll | 6.1.7601.17514 | NPS Accounting Provider
|
| | iasads.dll | 6.1.7600.16385 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 6.1.7600.16385 | NPS Datastore server
|
| | iashlpr.dll | 6.1.7600.16385 | NPS Surrogate Component
|
| | iasmigplugin.dll | 6.1.7600.16385 | NPS Migration DLL
|
| | iasnap.dll | 6.1.7600.16385 | NPS NAP Provider
|
| | iaspolcy.dll | 6.1.7600.16385 | NPS Pipeline
|
| | iasrad.dll | 6.1.7601.17514 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 6.1.7601.17514 | NPS XML Datastore Access
|
| | iassam.dll | 6.1.7600.16385 | NPS NT SAM Provider
|
| | iassdo.dll | 6.1.7600.16385 | NPS SDO Component
|
| | iassvcs.dll | 6.1.7600.16385 | NPS Services Component
|
| | icardie.dll | 8.0.7600.16385 | Microsoft Information Card IE Helper
|
| | icardres.dll | 3.0.4506.4926 | Windows CardSpace
|
| | iccvid.dll | 1.10.0.13 | Cinepak® Codec
|
| | icm32.dll | 6.1.7600.16385 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 6.1.7600.16385 | ICMP DLL
|
| | icmui.dll | 6.1.7600.16385 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 6.1.7600.16385 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 6.1.7600.16385 | Internet Gateway Device properties
|
| | idndl.dll | 6.1.7600.16385 | Downlevel DLL
|
| | idstore.dll | 6.1.7600.16385 | Identity Store
|
| | ieakeng.dll | 8.0.7600.16385 | Internet Explorer Administration Kit Engine Library
|
| | ieaksie.dll | 8.0.7600.16385 | Internet Explorer Snap-in Extension to Group Policy
|
| | ieakui.dll | 8.0.7600.16385 | Microsoft IEAK Shared UI DLL
|
| | ieapfltr.dll | 8.0.6001.18669 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.7601.17514 | IEAK branding
|
| | ieframe.dll | 8.0.7601.17514 | Internet Browser
|
| | iepeers.dll | 8.0.7601.17514 | Internet Explorer Peer Objects
|
| | iernonce.dll | 8.0.7600.16385 | Extended RunOnce processing with UI
|
| | iertutil.dll | 8.0.7601.17514 | Run time utility for Internet Explorer
|
| | iesetup.dll | 8.0.7600.16385 | IOD Version Map
|
| | iesysprep.dll | 8.0.7601.17514 | IE Sysprep Provider
|
| | ieui.dll | 8.0.7600.16385 | Internet Explorer UI Engine
|
| | ifmon.dll | 6.1.7600.16385 | IF Monitor DLL
|
| | ifsutil.dll | 6.1.7601.17514 | IFS Utility DLL
|
| | ifsutilx.dll | 6.1.7600.16385 | IFS Utility Extension DLL
|
| | imagehlp.dll | 6.1.7601.17514 | Windows NT Image Helper
|
| | imageres.dll | 6.1.7600.16385 | Windows Image Resource
|
| | imagesp1.dll | 6.1.7600.16385 | Windows SP1 Image Resource
|
| | imapi.dll | 6.1.7600.16385 | Image Mastering API
|
| | imapi2.dll | 6.1.7601.17514 | Image Mastering API v2
|
| | imapi2fs.dll | 6.1.7601.17514 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 8.0.7601.17514 | IE plugin image decoder support DLL
|
| | imjp10k.dll | 10.1.7600.16385 | Microsoft IME
|
| | imm32.dll | 6.1.7601.17514 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 6.1.7601.17514 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 6.1.7601.17514 | Microsoft MIB-II subagent
|
| | inetres.dll | 6.1.7600.16385 | Microsoft Internet Messaging API Resources
|
| | infocardapi.dll | 3.0.4506.4926 | Microsoft InfoCards
|
| | inked.dll | 6.1.7600.16385 | Microsoft Tablet PC InkEdit Control
|
| | input.dll | 6.1.7601.17514 | InputSetting DLL
|
| | inseng.dll | 8.0.7601.17514 | Install engine
|
| | iologmsg.dll | 6.1.7600.16385 | IO Logging DLL
|
| | ipbusenumproxy.dll | 6.1.7600.16385 | Associated Device Presence Proxy Dll
|
| | iphlpapi.dll | 6.1.7601.17514 | IP Helper API
|
| | iprop.dll | 6.1.7600.16385 | OLE PropertySet Implementation
|
| | iprtprio.dll | 6.1.7600.16385 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 6.1.7601.17514 | IP Router Manager
|
| | ipsecsnp.dll | 6.1.7600.16385 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 6.1.7601.17514 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_qc.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 6.1.7600.16385 | Infrared Class Coinstaller
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 6.1.7600.16385 | iSCSI Discovery api
|
| | iscsied.dll | 6.1.7600.16385 | iSCSI Extension DLL
|
| | iscsium.dll | 6.1.7601.17514 | iSCSI Discovery api
|
| | iscsiwmi.dll | 6.1.7600.16385 | MS iSCSI Initiator WMI Provider
|
| | itircl.dll | 6.1.7601.17514 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 6.1.7600.16385 | Microsoft® InfoTech Storage System Library
|
| | itvdata.dll | 6.6.7601.17514 | iTV Data Filters.
|
| | iyuv_32.dll | 6.1.7601.17514 | Intel Indeo(R) Video YUV Codec
|
| | jscript.dll | 5.8.7601.17514 | Microsoft ® JScript
|
| | jsproxy.dll | 8.0.7600.16385 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 6.1.7600.16385 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 6.1.7600.16385 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 6.1.7600.16385 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 6.1.7600.16385 | Albania Keyboard Layout
|
| | kbdarme.dll | 6.1.7600.16385 | Eastern Armenian Keyboard Layout
|
| | kbdarmw.dll | 6.1.7600.16385 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 6.1.7600.16385 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 6.1.7600.16385 | Azeri-Latin Keyboard Layout
|
| | kbdbash.dll | 6.1.7601.17514 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 6.1.7600.16385 | Belgian Keyboard Layout
|
| | kbdbene.dll | 6.1.7600.16385 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 6.1.7600.16385 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 6.1.7600.16385 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 6.1.7600.16385 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 6.1.7601.17514 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 6.1.7600.16385 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 6.1.7600.16385 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbulg.dll | 6.1.7601.17514 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 6.1.7600.16385 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 6.1.7600.16385 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcr.dll | 6.1.7600.16385 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 6.1.7600.16385 | Czech Keyboard Layout
|
| | kbdcz1.dll | 6.1.7601.17514 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 6.1.7600.16385 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 6.1.7600.16385 | Danish Keyboard Layout
|
| | kbddiv1.dll | 6.1.7600.16385 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 6.1.7600.16385 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 6.1.7600.16385 | Dvorak US English Keyboard Layout
|
| | kbdes.dll | 6.1.7600.16385 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 6.1.7600.16385 | Estonia Keyboard Layout
|
| | kbdfa.dll | 6.1.7600.16385 | Persian Keyboard Layout
|
| | kbdfc.dll | 6.1.7600.16385 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 6.1.7600.16385 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 6.1.7600.16385 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 6.1.7600.16385 | Færoese Keyboard Layout
|
| | kbdfr.dll | 6.1.7600.16385 | French Keyboard Layout
|
| | kbdgae.dll | 6.1.7600.16385 | Gaelic Keyboard Layout
|
| | kbdgeo.dll | 6.1.7601.17514 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 6.1.7600.16385 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeoqw.dll | 6.1.7600.16385 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 6.1.7601.17514 | Greek_Latin Keyboard Layout
|
| | kbdgr.dll | 6.1.7600.16385 | German Keyboard Layout
|
| | kbdgr1.dll | 6.1.7601.17514 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 6.1.7600.16385 | Greenlandic Keyboard Layout
|
| | kbdhau.dll | 6.1.7600.16385 | Hausa Keyboard Layout
|
| | kbdhe.dll | 6.1.7600.16385 | Greek Keyboard Layout
|
| | kbdhe220.dll | 6.1.7600.16385 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 6.1.7600.16385 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 6.1.7600.16385 | KBDHEB Keyboard Layout
|
| | kbdhela2.dll | 6.1.7600.16385 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 6.1.7600.16385 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 6.1.7600.16385 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 6.1.7600.16385 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 6.1.7600.16385 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 6.1.7600.16385 | Igbo Keyboard Layout
|
| | kbdic.dll | 6.1.7600.16385 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 6.1.7600.16385 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 6.1.7600.16385 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 6.1.7600.16385 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 6.1.7601.17514 | Bengali Keyboard Layout
|
| | kbdindev.dll | 6.1.7600.16385 | Devanagari Keyboard Layout
|
| | kbdinguj.dll | 6.1.7600.16385 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 6.1.7601.17514 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 6.1.7601.17514 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 6.1.7600.16385 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 6.1.7601.17514 | Marathi Keyboard Layout
|
| | kbdinori.dll | 6.1.7601.17514 | Oriya Keyboard Layout
|
| | kbdinpun.dll | 6.1.7600.16385 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 6.1.7601.17514 | Tamil Keyboard Layout
|
| | kbdintel.dll | 6.1.7601.17514 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 6.1.7600.16385 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 6.1.7600.16385 | Irish Keyboard Layout
|
| | kbdit.dll | 6.1.7600.16385 | Italian Keyboard Layout
|
| | kbdit142.dll | 6.1.7600.16385 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 6.1.7600.16385 | Inuktitut Latin Keyboard Layout
|
| | kbdjpn.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 6.1.7600.16385 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 6.1.7600.16385 | Cambodian Standard Keyboard Layout
|
| | kbdkor.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkyr.dll | 6.1.7600.16385 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 6.1.7600.16385 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 6.1.7600.16385 | Lao Standard Keyboard Layout
|
| | kbdlk41a.dll | 6.1.7601.17514 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 6.1.7600.16385 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 6.1.7601.17514 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 6.1.7600.16385 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 6.1.7600.16385 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 6.1.7600.16385 | Latvia-QWERTY Keyboard Layout
|
| | kbdmac.dll | 6.1.7600.16385 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 6.1.7600.16385 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 6.1.7601.17514 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 6.1.7600.16385 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 6.1.7600.16385 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 6.1.7601.17514 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 6.1.7600.16385 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdne.dll | 6.1.7600.16385 | Dutch Keyboard Layout
|
| | kbdnec.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 6.1.7600.16385 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 6.1.7601.17514 | Nepali Keyboard Layout
|
| | kbdno.dll | 6.1.7600.16385 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 6.1.7600.16385 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 6.1.7600.16385 | Sesotho sa Leboa Keyboard Layout
|
| | kbdpash.dll | 6.1.7600.16385 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdpl.dll | 6.1.7600.16385 | Polish Keyboard Layout
|
| | kbdpl1.dll | 6.1.7600.16385 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 6.1.7601.17514 | Portuguese Keyboard Layout
|
| | kbdro.dll | 6.1.7600.16385 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 6.1.7600.16385 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 6.1.7600.16385 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 6.1.7600.16385 | Russian Keyboard Layout
|
| | kbdru1.dll | 6.1.7600.16385 | Russia(Typewriter) Keyboard Layout
|
| | kbdsf.dll | 6.1.7601.17514 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 6.1.7601.17514 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 6.1.7600.16385 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 6.1.7600.16385 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 6.1.7600.16385 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 6.1.7600.16385 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 6.1.7600.16385 | Sinhala Keyboard Layout
|
| | kbdsorex.dll | 6.1.7600.16385 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 6.1.7600.16385 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 6.1.7600.16385 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 6.1.7600.16385 | Spanish Keyboard Layout
|
| | kbdsw.dll | 6.1.7600.16385 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 6.1.7600.16385 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 6.1.7600.16385 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 6.1.7600.16385 | Syriac Phoenetic Keyboard Layout
|
| | kbdtajik.dll | 6.1.7601.17514 | Tajik Keyboard Layout
|
| | kbdtat.dll | 6.1.7600.16385 | Tatar_Cyrillic Keyboard Layout
|
| | kbdth0.dll | 6.1.7600.16385 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 6.1.7600.16385 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 6.1.7600.16385 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 6.1.7600.16385 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtiprc.dll | 6.1.7600.16385 | Tibetan (PRC) Keyboard Layout
|
| | kbdtuf.dll | 6.1.7601.17514 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 6.1.7601.17514 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 6.1.7601.17514 | Turkmen Keyboard Layout
|
| | kbdughr.dll | 6.1.7600.16385 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 6.1.7601.17514 | Uyghur Keyboard Layout
|
| | kbduk.dll | 6.1.7600.16385 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 6.1.7600.16385 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 6.1.7600.16385 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 6.1.7600.16385 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 6.1.7600.16385 | Urdu Keyboard Layout
|
| | kbdus.dll | 6.1.7601.17514 | United States Keyboard Layout
|
| | kbdusa.dll | 6.1.7600.16385 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 6.1.7600.16385 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 6.1.7600.16385 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 6.1.7600.16385 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 6.1.7600.16385 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 6.1.7600.16385 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 6.1.7600.16385 | Wolof Keyboard Layout
|
| | kbdyak.dll | 6.1.7600.16385 | Yakut - Russia Keyboard Layout
|
| | kbdyba.dll | 6.1.7600.16385 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 6.1.7600.16385 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 6.1.7600.16385 | Serbian (Latin) Keyboard Layout
|
| | kerberos.dll | 6.1.7601.17514 | Kerberos Security Package
|
| | kernel32.dll | 6.1.7601.17514 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 6.1.7601.17514 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 6.1.7600.16385 | CNG Key Isolation Service
|
| | keymgr.dll | 6.1.7600.16385 | Stored User Names and Passwords
|
| | korwbrkr.dll | 6.1.7600.16385 | korwbrkr
|
| | ksuser.dll | 6.1.7600.16385 | User CSA Library
|
| | ktmw32.dll | 6.1.7600.16385 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 6.1.7600.16385 | Policy Storage dll
|
| | l2nacp.dll | 6.1.7600.16385 | Windows Onex Credential Provider
|
| | l2sechc.dll | 6.1.7600.16385 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.7600.16385 | Windows Media Logagent Proxy
|
| | licmgr10.dll | 8.0.7601.17514 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 6.1.7600.16385 | Windows Volume Tracking
|
| | loadperf.dll | 6.1.7600.16385 | Load & Unload Performance Counters
|
| | localsec.dll | 6.1.7601.17514 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 6.1.7600.16385 | Microsoft Windows Location API
|
| | loghours.dll | 6.1.7600.16385 | Schedule Dialog
|
| | logoncli.dll | 6.1.7601.17514 | Net Logon Client DLL
|
| | lpk.dll | 6.1.7600.16385 | Language Pack
|
| | lsmproxy.dll | 6.1.7601.17514 | LSM interfaces proxy Dll
|
| | luainstall.dll | 6.1.7601.17514 | Lua manifest install
|
| | lz32.dll | 6.1.7600.16385 | LZ Expand/Compress API DLL
|
| | magnification.dll | 6.1.7600.16385 | Microsoft Magnification API
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mcewmdrmndbootstrap.dll | 1.3.2302.0 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 6.1.7601.17514 | Video For Windows MCI driver
|
| | mcicda.dll | 6.1.7600.16385 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 6.6.7601.17514 | DirectShow MCI Driver
|
| | mciseq.dll | 6.1.7600.16385 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 6.1.7600.16385 | MCI driver for waveform audio
|
| | mctres.dll | 6.1.7600.16385 | MCT resource DLL
|
| | mdminst.dll | 6.1.7600.16385 | Modem Class Installer
|
| | mediametadatahandler.dll | 6.1.7601.17514 | Media Metadata Handler
|
| | mf.dll | 12.0.7601.17514 | Media Foundation DLL
|
| | mf3216.dll | 6.1.7600.16385 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 6.1.7600.16385 | Media Foundation AAC Encoder
|
| | mfc40.dll | 4.1.0.6151 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6151 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfcsubs.dll | 2001.12.8530.16385 | COM+
|
| | mfds.dll | 12.0.7601.17514 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 6.1.7600.16385 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.7600.16385 | Media Foundation Error DLL
|
| | mfh264enc.dll | 6.1.7600.16385 | Media Foundation H264 Encoder
|
| | mfmjpegdec.dll | 6.1.7600.16385 | Media Foundation MJPEG Decoder
|
| | mfplat.dll | 12.0.7600.16385 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.7601.17514 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.7600.16385 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.7601.17514 | Media Foundation ReadWrite DLL
|
| | mfvdsp.dll | 6.1.7600.16385 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 6.1.7600.16385 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 6.1.7600.16385 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | midimap.dll | 6.1.7600.16385 | Microsoft MIDI Mapper
|
| | migisol.dll | 6.1.7601.17514 | Migration System Isolation Layer
|
| | miguiresource.dll | 6.1.7600.16385 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.7601.17514 | MIME Filter
|
| | mlang.dll | 6.1.7600.16385 | Multi Language Support DLL
|
| | mmcbase.dll | 6.1.7600.16385 | MMC Base DLL
|
| | mmci.dll | 6.1.7600.16385 | Media class installer
|
| | mmcico.dll | 6.1.7600.16385 | Media class co-installer
|
| | mmcndmgr.dll | 6.1.7601.17514 | MMC Node Manager DLL
|
| | mmcshext.dll | 6.1.7600.16385 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 6.1.7601.17514 | MMDevice API
|
| | mmres.dll | 6.1.7600.16385 | General Audio Resources
|
| | modemui.dll | 6.1.7600.16385 | Windows Modem Properties
|
| | moricons.dll | 6.1.7600.16385 | Windows NT Setup Icon Resources Library
|
| | mp3dmod.dll | 6.1.7600.16385 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 6.1.7600.16385 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 6.1.7600.16385 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 6.1.7600.16385 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 6.1.7600.16385 | Multiple Provider Router DLL
|
| | mprapi.dll | 6.1.7601.17514 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 6.1.7601.17514 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 6.1.7600.16385 | Dynamic Interface Manager
|
| | mprmsg.dll | 6.1.7600.16385 | Multi-Protocol Router Service Messages DLL
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 6.1.7601.17514 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 6.1.7600.16385 | Microsoft ACM Audio Filter
|
| | msadce.dll | 6.1.7601.17514 | OLE DB Cursor Engine
|
| | msadcer.dll | 6.1.7600.16385 | OLE DB Cursor Engine Resources
|
| | msadcf.dll | 6.1.7601.17514 | Remote Data Services Data Factory
|
| | msadcfr.dll | 6.1.7600.16385 | Remote Data Services Data Factory Resources
|
| | msadco.dll | 6.1.7601.17514 | Remote Data Services Data Control
|
| | msadcor.dll | 6.1.7600.16385 | Remote Data Services Data Control Resources
|
| | msadcs.dll | 6.1.7601.17514 | Remote Data Services ISAPI Library
|
| | msadds.dll | 6.1.7600.16385 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 6.1.7600.16385 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 6.1.7600.16385 | ActiveX Data Objects Resources
|
| | msado15.dll | 6.1.7601.17514 | ActiveX Data Objects
|
| | msadomd.dll | 6.1.7601.17514 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 6.1.7601.17514 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 6.1.7601.17514 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 6.1.7600.16385 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 6.1.7600.16385 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msasn1.dll | 6.1.7601.17514 | ASN.1 Runtime APIs
|
| | msaudite.dll | 6.1.7600.16385 | Security Audit Events DLL
|
| | mscandui.dll | 6.1.7600.16385 | MSCANDUI Server DLL
|
| | mscat32.dll | 6.1.7600.16385 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 6.1.7601.17514 | Microsoft Class Mini-driver
|
| | mscms.dll | 6.1.7601.17514 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 4.0.40305.0 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 2.0.50727.5420 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.5420 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 6.1.7600.16385 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 6.1.7600.16385 | ODBC Code Page Translator
|
| | msctf.dll | 6.1.7600.16385 | MSCTF Server DLL
|
| | msctfmonitor.dll | 6.1.7600.16385 | MsCtfMonitor DLL
|
| | msctfp.dll | 6.1.7600.16385 | MSCTFP Server DLL
|
| | msctfui.dll | 6.1.7600.16385 | MSCTFUI Server DLL
|
| | msdadc.dll | 6.1.7600.16385 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 6.1.7600.16385 | Built-In Diagnostics
|
| | msdaenum.dll | 6.1.7600.16385 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 6.1.7600.16385 | OLE DB Error Collection Stub
|
| | msdaora.dll | 6.1.7600.16385 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 6.1.7600.16385 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 6.1.7601.17514 | OLE DB Simple Provider
|
| | msdaprsr.dll | 6.1.7600.16385 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 6.1.7600.16385 | OLE DB Persistence Services
|
| | msdaps.dll | 6.1.7600.16385 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 6.1.7601.17514 | OLE DB Remote Provider
|
| | msdaremr.dll | 6.1.7600.16385 | OLE DB Remote Provider Resources
|
| | msdart.dll | 6.1.7600.16385 | OLE DB Runtime Routines
|
| | msdasc.dll | 6.1.7600.16385 | OLE DB Service Components Stub
|
| | msdasql.dll | 6.1.7601.17514 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 6.1.7600.16385 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 6.1.7600.16385 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 6.1.7600.16385 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 6.1.7600.16385 | OLE DB RootBinder Stub
|
| | msdelta.dll | 6.1.7600.16385 | Microsoft Patch Engine
|
| | msdfmap.dll | 6.1.7601.17514 | Data Factory Handler
|
| | msdmo.dll | 6.6.7601.17514 | DMO Runtime
|
| | msdrm.dll | 6.1.7601.17514 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 8.0.7601.17514 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 8.0.7601.17514 | Microsoft Feeds Background Sync
|
| | msftedit.dll | 5.41.21.2510 | Rich Text Edit Control, v4.1
|
| | mshtml.dll | 8.0.7601.17514 | Microsoft (R) HTML Viewer
|
| | mshtmled.dll | 8.0.7601.17514 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 8.0.7600.16385 | Microsoft® HTML Editing Component's Resource DLL
|
| | msi.dll | 5.0.7601.17514 | Windows Installer
|
| | msidcrl30.dll | 6.1.7600.16385 | IDCRL Dynamic Link Library
|
| | msident.dll | 6.1.7600.16385 | Microsoft Identity Manager
|
| | msidle.dll | 6.1.7600.16385 | User Idle Monitor
|
| | msidntld.dll | 6.1.7600.16385 | Microsoft Identity Manager
|
| | msieftp.dll | 6.1.7601.17514 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.7601.17514 | Windows® installer
|
| | msiltcfg.dll | 5.0.7600.16385 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 6.1.7600.16385 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.7600.16385 | Windows® Installer International Messages
|
| | msimtf.dll | 6.1.7600.16385 | Active IMM Server DLL
|
| | msisip.dll | 5.0.7600.16385 | MSI Signature SIP Provider
|
| | msjet40.dll | 4.0.9756.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9756.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 6.1.7601.17514 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmpeg2adec.dll | 6.1.7140.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 6.1.7601.17514 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 6.1.7140.0 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.7601.17514 | DRM ActiveX Network Object
|
| | msobjs.dll | 6.1.7600.16385 | System object audit names
|
| | msoeacct.dll | 6.1.7600.16385 | Microsoft Internet Account Manager
|
| | msoert2.dll | 6.1.7600.16385 | Microsoft Windows Mail RT Lib
|
| | msorc32r.dll | 6.1.7600.16385 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 6.1.7601.17514 | ODBC Driver for Oracle
|
| | mspatcha.dll | 6.1.7600.16385 | Microsoft File Patch Application API
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msports.dll | 6.1.7600.16385 | Ports Class Installer
|
| | msrating.dll | 8.0.7601.17514 | Internet Ratings and Local User Management DLL
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 6.1.7600.16385 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 6.1.7600.16385 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 6.1.7601.17514 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.7600.16385 | msscntrs.dll
|
| | msscp.dll | 11.0.7601.17514 | Windows Media Secure Content Provider
|
| | mssha.dll | 6.1.7600.16385 | Windows Security Health Agent
|
| | msshavmsg.dll | 6.1.7600.16385 | Windows Security Health Agent Validator Message
|
| | msshooks.dll | 7.0.7600.16385 | MSSHooks.dll
|
| | mssign32.dll | 6.1.7600.16385 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 6.1.7600.16385 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.7600.16385 | mssitlb
|
| | mssph.dll | 7.0.7600.16385 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.7601.17514 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.7600.16385 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.7601.17514 | mssrch.dll
|
| | mssvp.dll | 7.0.7601.17514 | MSSearch Vista Platform
|
| | msswch.dll | 6.1.7600.16385 | msswch
|
| | mstask.dll | 6.1.7601.17514 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstime.dll | 8.0.7601.17514 | Microsoft (R) Timed Interactive Multimedia Extensions to HTML
|
| | mstscax.dll | 6.1.7601.17514 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 6.1.7601.17514 | MSUTB Server DLL
|
| | msv1_0.dll | 6.1.7601.17514 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.7600.16385 | Windows NT IOStreams DLL
|
| | msvcp60.dll | 7.0.7600.16385 | Windows NT C++ Runtime Library DLL
|
| | msvcrt.dll | 7.0.7600.16385 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 6.1.7600.16385 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 6.1.7601.17514 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 6.1.7601.17514 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.7601.17514 | ActiveX control for streaming video
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.7600.16385 | Windows Media Device Manager Core
|
| | mswsock.dll | 6.1.7601.17514 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9756.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 6.1.7600.16385 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.7601.17514 | MSXML 3.0 SP11
|
| | msxml3r.dll | 8.110.7600.16385 | XML Resources
|
| | msxml6.dll | 6.30.7601.17514 | MSXML 6.0 SP3
|
| | msxml6r.dll | 6.30.7600.16385 | XML Resources
|
| | msyuv.dll | 6.1.7601.17514 | Microsoft UYVY Video Decompressor
|
| | mtxclu.dll | 2001.12.8531.17514 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.8530.16385 | COM+
|
| | mtxex.dll | 2001.12.8530.16385 | COM+
|
| | mtxlegih.dll | 2001.12.8530.16385 | COM+
|
| | mtxoci.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 6.1.7601.17514 | MUI Callback for font registry settings
|
| | mycomput.dll | 6.1.7600.16385 | Computer Management
|
| | mydocs.dll | 6.1.7601.17514 | My Documents Folder UI
|
| | napcrypt.dll | 6.1.7601.17514 | NAP Cryptographic API helper
|
| | napdsnap.dll | 6.1.7601.17514 | NAP GPEdit Extension
|
| | naphlpr.dll | 6.1.7601.17514 | NAP client config API helper
|
| | napinsp.dll | 6.1.7600.16385 | E-mail Naming Shim Provider
|
| | napipsec.dll | 6.1.7600.16385 | NAP IPSec Enforcement Client
|
| | napmontr.dll | 6.1.7600.16385 | NAP Netsh Helper
|
| | nativehooks.dll | 6.1.7600.16385 | Microsoft Narrator Native hook handler
|
| | naturallanguage6.dll | 6.1.7601.17514 | Natural Language Development Platform 6
|
| | ncdprop.dll | 6.1.7600.16385 | Advanced network device properties
|
| | nci.dll | 6.1.7601.17514 | CoInstaller: NET
|
| | ncobjapi.dll | 6.1.7600.16385 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 6.1.7600.16385 | Windows cryptographic library
|
| | ncryptui.dll | 6.1.7601.17514 | Windows cryptographic key protection UI library
|
| | ncsi.dll | 6.1.7601.17514 | Network Connectivity Status Indicator
|
| | nddeapi.dll | 6.1.7600.16385 | Network DDE Share Management APIs
|
| | ndfapi.dll | 6.1.7600.16385 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 6.1.7600.16385 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 6.1.7600.16385 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 6.1.7600.16385 | NdisCap Notify Object
|
| | ndishc.dll | 6.1.7600.16385 | NDIS Helper Classes
|
| | ndproxystub.dll | 6.1.7600.16385 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 6.1.7600.16385 | NegoExtender Security Package
|
| | netapi32.dll | 6.1.7601.17514 | Net Win32 API DLL
|
| | netbios.dll | 6.1.7600.16385 | NetBIOS Interface Library
|
| | netcenter.dll | 6.1.7601.17514 | Network Center control panel
|
| | netcfgx.dll | 6.1.7601.17514 | Network Configuration Objects
|
| | netcorehc.dll | 6.1.7600.16385 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 6.1.7601.17514 | Network Diagnostic Framework
|
| | netevent.dll | 6.1.7600.16385 | Net Event Handler
|
| | netfxperf.dll | 4.0.40305.0 | Extensible Performance Counter Shim
|
| | neth.dll | 6.1.7600.16385 | Net Help Messages DLL
|
| | netid.dll | 6.1.7601.17514 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 6.1.7601.17514 | Netio Helper DLL
|
| | netjoin.dll | 6.1.7601.17514 | Domain Join DLL
|
| | netlogon.dll | 6.1.7601.17514 | Net Logon Services DLL
|
| | netmsg.dll | 6.1.7600.16385 | Net Messages DLL
|
| | netplwiz.dll | 6.1.7601.17514 | Map Network Drives/Network Places Wizard
|
| | netprof.dll | 6.1.7600.16385 | Network Profile Management UI
|
| | netprofm.dll | 6.1.7600.16385 | Network List Manager
|
| | netshell.dll | 6.1.7601.17514 | Network Connections Shell
|
| | netutils.dll | 6.1.7601.17514 | Net Win32 API Helpers DLL
|
| | networkexplorer.dll | 6.1.7601.17514 | Network Explorer
|
| | networkitemfactory.dll | 6.1.7600.16385 | NetworkItem Factory
|
| | networkmap.dll | 6.1.7601.17514 | Network Map
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | nlaapi.dll | 6.1.7601.17514 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.7600.16385 | HTML filter
|
| | nlmgp.dll | 6.1.7600.16385 | Network List Manager Snapin
|
| | nlmsprep.dll | 6.1.7600.16385 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 6.1.7601.17514 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0001.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0002.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0003.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0007.dll | 6.1.7600.16385 | Microsoft German Natural Language Server Data and Code
|
| | nlsdata0009.dll | 6.1.7600.16385 | Microsoft English Natural Language Server Data and Code
|
| | nlsdata000a.dll | 6.1.7600.16385 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlsdata000c.dll | 6.1.7600.16385 | Microsoft French Natural Language Server Data and Code
|
| | nlsdata000d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata000f.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0010.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlsdata0013.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0018.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0019.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0020.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0021.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0022.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0024.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0026.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0027.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata002a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0039.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata003e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0045.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0046.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0047.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0049.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004c.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0414.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0416.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0816.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata081a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0c1a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdl.dll | 6.1.7600.16385 | Nls Downlevel DLL
|
| | nlslexicons0001.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0002.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0003.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0007.dll | 6.1.7600.16385 | Microsoft German Natural Language Server Data and Code
|
| | nlslexicons0009.dll | 6.1.7600.16385 | Microsoft English Natural Language Server Data and Code
|
| | nlslexicons000a.dll | 6.1.7600.16385 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlslexicons000c.dll | 6.1.7600.16385 | Microsoft French Natural Language Server Data and Code
|
| | nlslexicons000d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons000f.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0010.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlslexicons0013.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0018.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0019.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0020.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0021.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0022.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0024.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0026.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0027.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons002a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0039.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons003e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0045.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0046.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0047.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0049.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004c.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0414.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0416.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0816.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons081a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0c1a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsmodels0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | normaliz.dll | 6.1.7600.16385 | Unicode Normalization DLL
|
| | npmproxy.dll | 6.1.7600.16385 | Network List Manager Proxy
|
| | nshhttp.dll | 6.1.7600.16385 | HTTP netsh DLL
|
| | nshipsec.dll | 6.1.7601.17514 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 6.1.7601.17514 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 6.1.7600.16385 | NSI User-mode interface DLL
|
| | ntdll.dll | 6.1.7601.17514 | NT Layer DLL
|
| | ntdsapi.dll | 6.1.7600.16385 | Active Directory Domain Services API
|
| | ntlanman.dll | 6.1.7601.17514 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 6.1.7600.16385 | Network object shell UI
|
| | ntmarta.dll | 6.1.7600.16385 | Windows NT MARTA provider
|
| | ntprint.dll | 6.1.7601.17514 | Spooler Setup DLL
|
| | ntshrui.dll | 6.1.7601.17514 | Shell extensions for sharing
|
| | ntvdm64.dll | 6.1.7600.16385 | 16-bit Emulation on NT64
|
| | nvapi.dll | 9.18.13.5286 | NVIDIA NVAPI Library, Version 352.86
|
| | nvcompiler.dll | |
|
| | nvcuda.dll | 8.17.13.5286 | NVIDIA CUDA Driver, Version 352.86
|
| | nvcuvid.dll | 7.17.13.5286 | NVIDIA CUDA Video Decode API, Version 352.86
|
| | nvd3dum.dll | 9.18.13.5286 | NVIDIA WDDM D3D Driver, Version 352.86
|
| | nvfbc.dll | 6.14.13.5286 | NVIDIA Frame Buffer Capture Library, Version
|
| | nvifr.dll | 6.14.13.5286 | NVIDIA In-band Frame Rendering Library, Version
|
| | nvinit.dll | 9.18.13.5286 | NVIDIA shim initialization dll, Version 352.86
|
| | nvoglshim32.dll | 9.18.13.5286 | NVIDIA OpenGL Shim Driver, Version 352.86
|
| | nvoglv32.dll | 9.18.13.5286 | NVIDIA Compatible OpenGL ICD
|
| | nvopencl.dll | 8.17.13.5286 | NVIDIA CUDA 7.5.8 OpenCL 1.1 Driver, Version 352.86
|
| | nvumdshim.dll | 9.18.13.5286 | NVIDIA D3D Shim Driver, Version 352.86
|
| | nvwgf2um.dll | 9.18.13.5286 | NVIDIA D3D10 Driver, Version 352.86
|
| | objsel.dll | 6.1.7600.16385 | Object Picker Dialog
|
| | occache.dll | 8.0.7601.17514 | Object Control Viewer
|
| | ocsetapi.dll | 6.1.7601.17514 | Windows Optional Component Setup API
|
| | odbc32.dll | 6.1.7601.17514 | ODBC Driver Manager
|
| | odbc32gt.dll | 6.1.7600.16385 | ODBC Driver Generic Thunk
|
| | odbcbcp.dll | 6.1.7600.16385 | BCP for ODBC
|
| | odbcconf.dll | 6.1.7601.17514 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 6.1.7601.17514 | ODBC Installer
|
| | odbccr32.dll | 6.1.7600.16385 | ODBC Cursor Library
|
| | odbccu32.dll | 6.1.7600.16385 | ODBC Cursor Library
|
| | odbcint.dll | 6.1.7600.16385 | ODBC Resources
|
| | odbcji32.dll | 6.1.7600.16385 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 6.1.7601.17514 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 6.1.7601.17514 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 6.1.7600.16385 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 6.1.7600.16385 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 6.1.7600.16385 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 6.1.7600.16385 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 6.1.7600.16385 | ODBC (3.0) driver for text files
|
| | offfilt.dll | 2008.0.7600.16385 | OFFICE Filter
|
| | ogldrv.dll | 6.1.7600.16385 | MSOGL
|
| | ole2.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | ole2disp.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole2nls.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole32.dll | 6.1.7601.17514 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.0.0.0 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.0.0.0 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.0.0.0 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 6.1.7601.17514 |
|
| | olecli32.dll | 6.1.7600.16385 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 6.1.7601.17514 | OLE DB Core Services
|
| | oledb32r.dll | 6.1.7600.16385 | OLE DB Core Services Resources
|
| | oledlg.dll | 6.1.7600.16385 | OLE User Interface Support
|
| | oleprn.dll | 6.1.7600.16385 | Oleprn DLL
|
| | olepro32.dll | 6.1.7601.17514 |
|
| | oleres.dll | 6.1.7600.16385 | Ole resource dll
|
| | olesvr32.dll | 6.1.7600.16385 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 6.1.7601.17514 | Microsoft OLE for Windows
|
| | onex.dll | 6.1.7601.17514 | IEEE 802.1X supplicant library
|
| | onexui.dll | 6.1.7601.17514 | IEEE 802.1X supplicant UI library
|
| | onlineidcpl.dll | 6.1.7601.17514 | Online IDs Control Panel
|
| | oobefldr.dll | 6.1.7601.17514 | Getting Started
|
| | opcservices.dll | 6.1.7601.17514 | Native Code OPC Services Library
|
| | opengl32.dll | 6.1.7600.16385 | OpenGL Client DLL
|
| | osbaseln.dll | 6.1.7600.16385 | Service Reporting API
|
| | osuninst.dll | 6.1.7600.16385 | Uninstall Interface
|
| | p2p.dll | 6.1.7600.16385 | Peer-to-Peer Grouping
|
| | p2pcollab.dll | 6.1.7600.16385 | Peer-to-Peer Collaboration
|
| | p2pgraph.dll | 6.1.7600.16385 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 6.1.7600.16385 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 6.1.7600.16385 | Object Packager2
|
| | panmap.dll | 6.1.7600.16385 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 6.1.7600.16385 | Auto Enrollment DLL
|
| | pcaui.dll | 6.1.7600.16385 | Program Compatibility Assistant User Interface Module
|
| | pcwum.dll | 6.1.7600.16385 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 6.1.7601.17514 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 6.1.7601.17514 | PDH UI
|
| | peerdist.dll | 6.1.7600.16385 | BranchCache Client Library
|
| | peerdistsh.dll | 6.1.7600.16385 | BranchCache Netshell Helper
|
| | perfcentercpl.dll | 6.1.7601.17514 | Performance Center
|
| | perfctrs.dll | 6.1.7600.16385 | Performance Counters
|
| | perfdisk.dll | 6.1.7600.16385 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 6.1.7600.16385 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 6.1.7600.16385 | Windows System Performance Objects DLL
|
| | perfproc.dll | 6.1.7600.16385 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 6.1.7601.17514 | Windows Remote Desktop Services Performance Objects
|
| | photometadatahandler.dll | 6.1.7600.16385 | Photo Metadata Handler
|
| | photowiz.dll | 6.1.7601.17514 | Photo Printing Wizard
|
| | pid.dll | 6.1.7600.16385 | Microsoft PID
|
| | pidgenx.dll | 6.1.7600.16385 | Pid Generation
|
| | pifmgr.dll | 6.1.7601.17514 | Windows NT PIF Manager Icon Resources Library
|
| | pku2u.dll | 6.1.7600.16385 | Pku2u Security Package
|
| | pla.dll | 6.1.7601.17514 | Performance Logs & Alerts
|
| | playsndsrv.dll | 6.1.7600.16385 | PlaySound Service
|
| | pmcsnap.dll | 6.1.7600.16385 | pmcsnap dll
|
| | pngfilt.dll | 8.0.7600.16385 | IE PNG plugin image decoder
|
| | pnidui.dll | 6.1.7601.17514 | Network System Icon
|
| | pnpsetup.dll | 6.1.7600.16385 | Pnp installer for CMI
|
| | pnrpnsp.dll | 6.1.7600.16385 | PNRP Name Space Provider
|
| | polstore.dll | 6.1.7600.16385 | Policy Storage dll
|
| | portabledeviceapi.dll | 6.1.7601.17514 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 6.1.7600.16385 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 6.1.7600.16385 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 6.1.7601.17514 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 6.1.7601.17514 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 6.1.7600.16385 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 6.1.7600.16385 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 6.1.7600.16385 | Windows Portable Device WMDRM Component
|
| | pots.dll | 6.1.7600.16385 | Power Troubleshooter
|
| | powercpl.dll | 6.1.7601.17514 | Power Options Control Panel
|
| | powrprof.dll | 6.1.7600.16385 | Power Profile Helper DLL
|
| | ppcsnap.dll | 6.1.7600.16385 | ppcsnap DLL
|
| | presentationcffrasterizernative_v0300.dll | 3.0.6920.4902 | WinFX OpenType/CFF Rasterizer
|
| | presentationhostproxy.dll | 4.0.40305.0 | Windows Presentation Foundation Host Proxy
|
| | presentationnative_v0300.dll | 3.0.6920.4902 | PresentationNative_v0300.dll
|
| | prflbmsg.dll | 6.1.7600.16385 | Perflib Event Messages
|
| | printui.dll | 6.1.7601.17514 | Printer Settings User Interface
|
| | prncache.dll | 6.1.7601.17514 | Print UI Cache
|
| | prnfldr.dll | 6.1.7601.17514 | prnfldr dll
|
| | prnntfy.dll | 6.1.7600.16385 | prnntfy DLL
|
| | prntvpt.dll | 6.1.7601.17514 | Print Ticket Services Module
|
| | profapi.dll | 6.1.7600.16385 | User Profile Basic API
|
| | propsys.dll | 7.0.7601.17514 | Microsoft Property System
|
| | provsvc.dll | 6.1.7601.17514 | Windows HomeGroup
|
| | provthrd.dll | 6.1.7600.16385 | WMI Provider Thread & Log Library
|
| | psapi.dll | 6.1.7600.16385 | Process Status Helper
|
| | psbase.dll | 6.1.7600.16385 | Protected Storage default provider
|
| | pshed.dll | 6.1.7600.16385 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 6.6.7600.16385 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | pstorec.dll | 6.1.7600.16385 | Protected Storage COM interfaces
|
| | pstorsvc.dll | 6.1.7600.16385 | Protected storage server
|
| | puiapi.dll | 6.1.7600.16385 | puiapi DLL
|
| | puiobj.dll | 6.1.7601.17514 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 6.1.7600.16385 | pwrshplugin.dll
|
| | qagent.dll | 6.1.7601.17514 | Quarantine Agent Proxy
|
| | qasf.dll | 12.0.7601.17514 | DirectShow ASF Support
|
| | qcap.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | qcliprov.dll | 6.1.7601.17514 | Quarantine Client WMI Provider
|
| | qdv.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | qdvd.dll | 6.6.7601.17514 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 6.6.7601.17514 | DirectShow Editing.
|
| | qedwipes.dll | 6.6.7600.16385 | DirectShow Editing SMPTE Wipes
|
| | qmgrprxy.dll | 7.5.7600.16385 | Background Intelligent Transfer Service Proxy
|
| | qshvhost.dll | 6.1.7601.17514 | Quarantine SHV Host
|
| | qsvrmgmt.dll | 6.1.7601.17514 | Quarantine Server Management
|
| | quartz.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | query.dll | 6.1.7601.17514 | Content Index Utility DLL
|
| | qutil.dll | 6.1.7601.17514 | Quarantine Utilities
|
| | qwave.dll | 6.1.7600.16385 | Windows NT
|
| | racengn.dll | 6.1.7601.17514 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 6.1.7600.16385 | Remote Assistance Contact List
|
| | radardt.dll | 6.1.7600.16385 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 6.1.7600.16385 | Microsoft Windows Resource Exhaustion Resolver
|
| | rasadhlp.dll | 6.1.7600.16385 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 6.1.7600.16385 | Remote Access API
|
| | rascfg.dll | 6.1.7600.16385 | RAS Configuration Objects
|
| | raschap.dll | 6.1.7601.17514 | Remote Access PPP CHAP
|
| | rasctrs.dll | 6.1.7600.16385 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 6.1.7600.16385 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 6.1.7600.16385 | Remote Access Common Dialog API
|
| | rasgcw.dll | 6.1.7600.16385 | RAS Wizard Pages
|
| | rasman.dll | 6.1.7600.16385 | Remote Access Connection Manager
|
| | rasmm.dll | 6.1.7600.16385 | RAS Media Manager
|
| | rasmontr.dll | 6.1.7600.16385 | RAS Monitor DLL
|
| | rasmxs.dll | 6.1.7600.16385 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 6.1.7600.16385 | RAS PLAP Credential Provider
|
| | rasppp.dll | 6.1.7601.17514 | Remote Access PPP
|
| | rasser.dll | 6.1.7600.16385 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 6.1.7601.17514 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 6.1.7601.17514 | Remote Access PPP EAP-TLS
|
| | rdpcore.dll | 6.1.7601.17514 | RDP Core DLL
|
| | rdpd3d.dll | 6.1.7601.17514 | RDP Direct3D Remoting DLL
|
| | rdpencom.dll | 6.1.7601.17514 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 6.1.7601.17514 | RDP Audio Endpoint
|
| | rdprefdrvapi.dll | 6.1.7601.17514 | Reflector Driver API
|
| | reagent.dll | 6.1.7601.17514 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 6.1.7601.17514 | Registry Configuration APIs
|
| | regctrl.dll | 6.1.7600.16385 | RegCtrl
|
| | remotepg.dll | 6.1.7601.17514 | Remote Sessions CPL Extension
|
| | resampledmo.dll | 6.1.7600.16385 | Windows Media Resampler
|
| | resutils.dll | 6.1.7601.17514 | Microsoft Cluster Resource Utility DLL
|
| | rgb9rast.dll | 6.1.7600.16385 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1230 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 6.1.7601.17514 | Wrapper Dll for Richedit 1.0
|
| | rnr20.dll | 6.1.7600.16385 | Windows Socket2 NameSpace DLL
|
| | rpcdiag.dll | 6.1.7600.16385 | RPC Diagnostics
|
| | rpchttp.dll | 6.1.7601.17514 | RPC HTTP DLL
|
| | rpcndfp.dll | 1.0.0.1 | RPC NDF Helper Class
|
| | rpcns4.dll | 6.1.7600.16385 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 6.1.7600.16385 | RPC Netshell Helper
|
| | rpcrt4.dll | 6.1.7601.17514 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 6.1.7601.17514 | Remote RPC Extension
|
| | rsaenh.dll | 6.1.7600.16385 | Microsoft Enhanced Cryptographic Provider
|
| | rscricon.dll | 1.10.0.0 | Realtek Card Reader Icon Dll
|
| | rshx32.dll | 6.1.7600.16385 | Security Shell Extension
|
| | rstrtmgr.dll | 6.1.7600.16385 | Restart Manager
|
| | rtffilt.dll | 2008.0.7600.16385 | RTF Filter
|
| | rtm.dll | 6.1.7600.16385 | Routing Table Manager
|
| | rtutils.dll | 6.1.7601.17514 | Routing Utilities
|
| | samcli.dll | 6.1.7601.17514 | Security Accounts Manager Client DLL
|
| | samlib.dll | 6.1.7600.16385 | SAM Library DLL
|
| | sampleres.dll | 6.1.7600.16385 | Microsoft Samples
|
| | sas.dll | 6.1.7600.16385 | WinLogon Software SAS Library
|
| | sbe.dll | 6.6.7601.17514 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.7600.16385 | Stream Buffer IO DLL
|
| | sberes.dll | 6.6.7600.16385 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 6.1.7601.17514 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 6.1.7600.16385 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 6.1.7601.17514 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 6.1.7601.17514 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 6.1.7601.17514 | TLS / SSL Security Provider
|
| | schedcli.dll | 6.1.7601.17514 | Scheduler Service Client DLL
|
| | scksp.dll | 6.1.7600.16385 | Microsoft Smart Card Key Storage Provider
|
| | scripto.dll | 6.6.7600.16385 | Microsoft ScriptO
|
| | scrobj.dll | 5.8.7600.16385 | Windows ® Script Component Runtime
|
| | scrptadm.dll | 6.1.7601.17514 | Script Adm Extension
|
| | scrrun.dll | 5.8.7600.16385 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 6.1.7600.16385 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 6.1.7600.16385 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 6.1.7600.16385 | NPS SDO Helper Component
|
| | searchfolder.dll | 6.1.7601.17514 | SearchFolder
|
| | sechost.dll | 6.1.7600.16385 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 6.1.7601.17514 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 6.1.7601.17514 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 6.1.7601.17514 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 6.1.7601.17514 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 6.1.7601.17514 | Security Support Provider Interface
|
| | security.dll | 6.1.7600.16385 | Security Support Provider Interface
|
| | sendmail.dll | 6.1.7600.16385 | Send Mail
|
| | sens.dll | 6.1.7600.16385 | System Event Notification Service (SENS)
|
| | sensapi.dll | 6.1.7600.16385 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 6.1.7600.16385 | Sensor API
|
| | sensorscpl.dll | 6.1.7601.17514 | Open Location and Other Sensors
|
| | serialui.dll | 6.1.7600.16385 | Serial Port Property Pages
|
| | serwvdrv.dll | 6.1.7600.16385 | Unimodem Serial Wave driver
|
| | sessenv.dll | 6.1.7601.17514 | Remote Desktop Configuration service
|
| | setupapi.dll | 6.1.7601.17514 | Windows Setup API
|
| | setupcln.dll | 6.1.7601.17514 | Setup Files Cleanup
|
| | sfc.dll | 6.1.7600.16385 | Windows File Protection
|
| | sfc_os.dll | 6.1.7600.16385 | Windows File Protection
|
| | shacct.dll | 6.1.7601.17514 | Shell Accounts Classes
|
| | shdocvw.dll | 6.1.7601.17514 | Shell Doc Object and Control Library
|
| | shell32.dll | 6.1.7601.17514 | Windows Shell Common Dll
|
| | shellstyle.dll | 6.1.7600.16385 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 6.1.7600.16385 | Shell Folder Service
|
| | shgina.dll | 6.1.7601.17514 | Windows Shell User Logon
|
| | shimeng.dll | 6.1.7600.16385 | Shim Engine DLL
|
| | shimgvw.dll | 6.1.7601.17514 | Photo Gallery Viewer
|
| | shlwapi.dll | 6.1.7601.17514 | Shell Light-weight Utility Library
|
| | shpafact.dll | 6.1.7600.16385 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 6.1.7601.17514 | Shell setup helper
|
| | shsvcs.dll | 6.1.7601.17514 | Windows Shell Services Dll
|
| | shunimpl.dll | 6.1.7601.17514 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 6.1.7601.17514 | Windows Shell Web Services
|
| | signdrv.dll | 6.1.7600.16385 | WMI provider for Signed Drivers
|
| | sisbkup.dll | 6.1.7601.17514 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 6.1.7600.16385 | Software Licensing Client Dll
|
| | slcext.dll | 6.1.7600.16385 | Software Licensing Client Extension Dll
|
| | slwga.dll | 6.1.7601.17514 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 6.1.7601.17514 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | sndvolsso.dll | 6.1.7601.17514 | SCA Volume
|
| | snmpapi.dll | 6.1.7600.16385 | SNMP Utility Library
|
| | softkbd.dll | 6.1.7600.16385 | Soft Keyboard Server and Tip
|
| | softpub.dll | 6.1.7600.16385 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 6.1.7600.16385 | Sort Version Server 2003
|
| | sortwindows6compat.dll | 6.1.7600.16385 | Sort Version Windows 6.0
|
| | spbcd.dll | 6.1.7601.17514 | BCD Sysprep Plugin
|
| | spfileq.dll | 6.1.7600.16385 | Windows SPFILEQ
|
| | spinf.dll | 6.1.7600.16385 | Windows SPINF
|
| | spnet.dll | 6.1.7600.16385 | Net Sysprep Plugin
|
| | spopk.dll | 6.1.7601.17514 | OPK Sysprep Plugin
|
| | spp.dll | 6.1.7601.17514 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 6.1.7601.17514 | Software Licensing Client Dll
|
| | sppcc.dll | 6.1.7600.16385 | Software Licensing Commerce Client
|
| | sppcext.dll | 6.1.7600.16385 | Software Protection Platform Client Extension Dll
|
| | sppcomapi.dll | 6.1.7601.17514 | Software Licensing Library
|
| | sppcommdlg.dll | 6.1.7600.16385 | Software Licensing UI API
|
| | sppinst.dll | 6.1.7601.17514 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 6.1.7600.16385 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 6.1.7600.16385 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 6.1.7601.17514 | Setup Wizard Framework
|
| | spwizimg.dll | 6.1.7600.16385 | Setup Wizard Framework Resources
|
| | spwizres.dll | 6.1.7601.17514 | Setup Wizard Framework Resources
|
| | spwmp.dll | 6.1.7601.17514 | Windows Media Player System Preparation DLL
|
| | sqlceoledb30.dll | 3.0.7600.0 | Microsoft SQL Mobile
|
| | sqlceqp30.dll | 3.0.7600.0 | Microsoft SQL Mobile
|
| | sqlcese30.dll | 3.0.7601.0 | Microsoft SQL Mobile
|
| | sqloledb.dll | 6.1.7601.17514 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 6.1.7601.17514 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.728.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 1999.10.20.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 1999.10.20.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 6.1.7600.16385 | XML extensions for SQL Server
|
| | sqmapi.dll | 6.1.7601.17514 | SQM Client
|
| | srchadmin.dll | 7.0.7601.17514 | Indexing Options
|
| | srclient.dll | 6.1.7600.16385 | Microsoft® Windows System Restore Client Library
|
| | srhelper.dll | 6.1.7600.16385 | Microsoft® Windows driver and windows update enumeration library
|
| | srpuxnativesnapin.dll | 6.1.7600.16385 | Application Control Policies Group Policy Editor Extension
|
| | srvcli.dll | 6.1.7601.17514 | Server Service Client DLL
|
| | sscore.dll | 6.1.7601.17514 | Server Service Core DLL
|
| | ssdpapi.dll | 6.1.7600.16385 | SSDP Client API DLL
|
| | sspicli.dll | 6.1.7601.17514 | Security Support Provider Interface
|
| | ssshim.dll | 6.1.7600.16385 | Windows Componentization Platform Servicing API
|
| | stclient.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Client
|
| | sti.dll | 6.1.7600.16385 | Still Image Devices client DLL
|
| | stobject.dll | 6.1.7601.17514 | Systray shell service object
|
| | storage.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | storagecontexthandler.dll | 6.1.7600.16385 | Device Center Storage Context Menu Handler
|
| | storprop.dll | 6.1.7600.16385 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.7601.17514 | Structured Query
|
| | sud.dll | 6.1.7601.17514 | SUD Control Panel
|
| | sxproxy.dll | 6.1.7600.16385 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 6.1.7601.17514 | Fusion 2.5
|
| | sxshared.dll | 6.1.7600.16385 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 6.1.7600.16385 | Sxs Store DLL
|
| | synccenter.dll | 6.1.7601.17514 | Microsoft Sync Center
|
| | synceng.dll | 6.1.7600.16385 | Windows Briefcase Engine
|
| | synchostps.dll | 6.1.7600.16385 | Proxystub for sync host
|
| | syncinfrastructure.dll | 6.1.7600.16385 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 6.1.7600.16385 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncreg.dll | 2007.94.7600.16385 | Microsoft Synchronization Framework Registration
|
| | syncui.dll | 6.1.7601.17514 | Windows Briefcase
|
| | syssetup.dll | 6.1.7601.17514 | Windows NT System Setup
|
| | systemcpl.dll | 6.1.7601.17514 | My System CPL
|
| | t2embed.dll | 6.1.7601.17514 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 6.1.7600.16385 | Microsoft TAPI3
|
| | tapi32.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 6.1.7600.16385 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 6.1.7601.17514 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 6.1.7601.17514 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 6.1.7601.17514 | Task Scheduler COM API
|
| | taskschdps.dll | 6.1.7600.16385 | Task Scheduler Interfaces Proxy
|
| | tbs.dll | 6.1.7600.16385 | TBS
|
| | tcpipcfg.dll | 6.1.7601.17514 | Network Configuration Objects
|
| | tcpmonui.dll | 6.1.7600.16385 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 6.1.7600.16385 | Event Trace Helper Library
|
| | termmgr.dll | 6.1.7601.17514 | Microsoft TAPI3 Terminal Manager
|
| | thawbrkr.dll | 6.1.7600.16385 | Thai Word Breaker
|
| | themecpl.dll | 6.1.7601.17514 | Personalization CPL
|
| | themeui.dll | 6.1.7601.17514 | Windows Theme API
|
| | thumbcache.dll | 6.1.7601.17514 | Microsoft Thumbnail Cache
|
| | timedatemuicallback.dll | 6.1.7600.16385 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 6.1.7601.17514 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tpmcompc.dll | 6.1.7600.16385 | Computer Chooser Dialog
|
| | tquery.dll | 7.0.7601.17514 | tquery.dll
|
| | traffic.dll | 6.1.7600.16385 | Microsoft Traffic Control 1.0 DLL
|
| | trapi.dll | 6.1.7601.17514 | Microsoft Narrator Text Renderer
|
| | tsbyuv.dll | 6.1.7601.17514 | Toshiba Video Codec
|
| | tschannel.dll | 6.1.7600.16385 | Task Scheduler Proxy
|
| | tsgqec.dll | 6.1.7601.17514 | RD Gateway QEC
|
| | tsmf.dll | 6.1.7601.17514 | RDP MF Plugin
|
| | tspkg.dll | 6.1.7601.17514 | Web Service Security Package
|
| | tsworkspace.dll | 6.1.7601.17514 | RemoteApp and Desktop Connection Component
|
| | tvratings.dll | 6.6.7600.16385 | Module for managing TV ratings
|
| | twext.dll | 6.1.7601.17514 | Previous Versions property page
|
| | txflog.dll | 2001.12.8530.16385 | COM+
|
| | txfw32.dll | 6.1.7600.16385 | TxF Win32 DLL
|
| | typelib.dll | 2.10.3029.1 | OLE 2.1 16/32 Interoperability Library
|
| | tzres.dll | 6.1.7601.17514 | Time Zones resource DLL
|
| | ubpm.dll | 6.1.7600.16385 | Unified Background Process Manager DLL
|
| | ucmhc.dll | 6.1.7600.16385 | UCM Helper Class
|
| | udhisapi.dll | 6.1.7600.16385 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 6.1.7600.16385 | eXfat Utility DLL
|
| | ufat.dll | 6.1.7600.16385 | FAT Utility DLL
|
| | uianimation.dll | 6.1.7600.16385 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.0.0.0 | Microsoft UI Automation Core
|
| | uicom.dll | 6.1.7600.16385 | Add/Remove Modems
|
| | uiribbon.dll | 6.1.7601.17514 | Windows Ribbon Framework
|
| | uiribbonres.dll | 6.1.7601.17514 | Windows Ribbon Framework Resources
|
| | ulib.dll | 6.1.7600.16385 | File Utilities Support DLL
|
| | umdmxfrm.dll | 6.1.7600.16385 | Unimodem Tranform Module
|
| | unimdmat.dll | 6.1.7601.17514 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 6.1.7600.16385 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | untfs.dll | 6.1.7601.17514 | NTFS Utility DLL
|
| | upnp.dll | 6.1.7601.17514 | UPnP Control Point API
|
| | upnphost.dll | 6.1.7600.16385 | UPnP Device Host
|
| | ureg.dll | 6.1.7600.16385 | Registry Utility DLL
|
| | url.dll | 8.0.7600.16385 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 8.0.7601.17514 | OLE32 Extensions for Win32
|
| | usbceip.dll | 6.1.7600.16385 | USBCEIP Task
|
| | usbperf.dll | 6.1.7600.16385 | USB Performance Objects DLL
|
| | usbui.dll | 6.1.7600.16385 | USB UI Dll
|
| | user32.dll | 6.1.7601.17514 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 6.1.7601.17514 | UserAccountControlSettings
|
| | usercpl.dll | 6.1.7601.17514 | User control panel
|
| | userenv.dll | 6.1.7601.17514 | Userenv
|
| | usp10.dll | 1.626.7601.17514 | Uniscribe Unicode script processor
|
| | utildll.dll | 6.1.7601.17514 | WinStation utility support DLL
|
| | uudf.dll | 6.1.7600.16385 | UDF Utility DLL
|
| | uxinit.dll | 6.1.7600.16385 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 6.1.7601.17514 | Setup Wizard Framework
|
| | uxlibres.dll | 6.1.7600.16385 | UXLib Resources
|
| | uxtheme.dll | 6.1.7600.16385 | Microsoft UxTheme Library
|
| | van.dll | 6.1.7601.17514 | View Available Networks
|
| | vault.dll | 6.1.7601.17514 | Windows vault Control Panel
|
| | vaultcli.dll | 6.1.7600.16385 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbscript.dll | 5.8.7601.17514 | Microsoft ® VBScript
|
| | vdmdbg.dll | 6.1.7600.16385 | VDMDBG.DLL
|
| | vds_ps.dll | 6.1.7600.16385 | Microsoft® Virtual Disk Service proxy/stub
|
| | vdsbas.dll | 6.1.7601.17514 | Virtual Disk Service Basic Provider
|
| | vdsdyn.dll | 6.1.7600.16385 | VDS Dynamic Volume Provider, Version 2.1.0.1
|
| | vdsvd.dll | 6.1.7600.16385 | VDS Virtual Disk Provider, Version 1.0
|
| | verifier.dll | 6.1.7600.16385 | Standard application verifier provider dll
|
| | version.dll | 6.1.7600.16385 | Version Checking and File Installation Libraries
|
| | vfpodbc.dll | 1.0.2.0 | vfpodbc
|
| | vfwwdm32.dll | 6.1.7601.17514 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 6.1.7600.16385 | Windows Media Resizer
|
| | virtdisk.dll | 6.1.7600.16385 | Virtual Disk API DLL
|
| | vpnikeapi.dll | 6.1.7601.17514 | VPN IKE API's
|
| | vss_ps.dll | 6.1.7600.16385 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 6.1.7601.17514 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 6.1.7600.16385 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 6.1.7600.16385 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 6.1.7600.16385 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 6.1.7600.16385 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 6.1.7600.16385 | Microsoft Windows Contacts Sync Provider
|
| | wavemsp.dll | 6.1.7601.17514 | Microsoft Wave MSP
|
| | wbemcomn.dll | 6.1.7601.17514 | WMI
|
| | wcnapi.dll | 6.1.7600.16385 | Windows Connect Now - API Helper DLL
|
| | wcncsvc.dll | 6.1.7601.17514 | Windows Connect Now - Config Registrar Service
|
| | wcneapauthproxy.dll | 6.1.7600.16385 | Windows Connect Now - WCN EAP Authenticator Proxy
|
| | wcneappeerproxy.dll | 6.1.7600.16385 | Windows Connect Now - WCN EAP PEER Proxy
|
| | wcnwiz.dll | 6.1.7600.16385 | Windows Connect Now Wizards
|
| | wcspluginservice.dll | 6.1.7600.16385 | WcsPlugInService DLL
|
| | wdc.dll | 6.1.7601.17514 | Performance Monitor
|
| | wdi.dll | 6.1.7600.16385 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 6.1.7600.16385 | Microsoft Digest Access
|
| | wdscore.dll | 6.1.7601.17514 | Panther Engine Module
|
| | webcheck.dll | 8.0.7601.17514 | Web Site Monitor
|
| | webclnt.dll | 6.1.7601.17514 | Web DAV Service DLL
|
| | webio.dll | 6.1.7601.17514 | Web Transfer Protocols API
|
| | webservices.dll | 6.1.7601.17514 | Windows Web Services Runtime
|
| | wecapi.dll | 6.1.7600.16385 | Event Collector Configuration API
|
| | wer.dll | 6.1.7601.17514 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 6.1.7600.16385 | WER Diagnostic Controller
|
| | werui.dll | 6.1.7600.16385 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 6.1.7600.16385 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 6.1.7600.16385 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 6.1.7600.16385 | Windows Firewall GPO Helper dll
|
| | wfhc.dll | 6.1.7600.16385 | Windows Firewall Helper Class
|
| | whealogr.dll | 6.1.7600.16385 | WHEA Troubleshooter
|
| | whhelper.dll | 6.1.7600.16385 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 6.1.7600.16385 | WIA Automation Layer
|
| | wiadefui.dll | 6.1.7601.17514 | WIA Scanner Default UI
|
| | wiadss.dll | 6.1.7600.16385 | WIA TWAIN compatibility layer
|
| | wiaextensionhost64.dll | 6.1.7600.16385 | WIA Extension Host for thunking APIs from 32-bit to 64-bit process
|
| | wiascanprofiles.dll | 6.1.7600.16385 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 6.1.7600.16385 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 6.1.7600.16385 | WIA Tracing
|
| | wiavideo.dll | 6.1.7601.17514 | WIA Video
|
| | wimgapi.dll | 6.1.7601.17514 | Windows Imaging Library
|
| | win32spl.dll | 6.1.7601.17514 | Client Side Rendering Print Provider
|
| | winbio.dll | 6.1.7600.16385 | Windows Biometrics Client API
|
| | winbrand.dll | 6.1.7600.16385 | Windows Branding Resources
|
| | wincredprovider.dll | 6.1.7600.16385 | wincredprovider DLL
|
| | windowscodecs.dll | 6.1.7601.17514 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 6.1.7600.16385 | Microsoft Windows Codecs Extended Library
|
| | winfax.dll | 6.1.7600.16385 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 6.1.7601.17514 | Windows HTTP Services
|
| | wininet.dll | 8.0.7601.17514 | Internet Extensions for Win32
|
| | winipsec.dll | 6.1.7600.16385 | Windows IPsec SPD Client DLL
|
| | winmm.dll | 6.1.7601.17514 | MCI API DLL
|
| | winnsi.dll | 6.1.7600.16385 | Network Store Information RPC interface
|
| | winrnr.dll | 6.1.7600.16385 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 6.1.7600.16385 | remtsvc
|
| | winrsmgr.dll | 6.1.7600.16385 | WSMan Shell API
|
| | winrssrv.dll | 6.1.7600.16385 | winrssrv
|
| | winsatapi.dll | 6.1.7601.17514 | Windows System Assessment Tool API
|
| | winscard.dll | 6.1.7601.17514 | Microsoft Smart Card API
|
| | winshfhc.dll | 6.1.7600.16385 | File Risk Estimation
|
| | winsockhc.dll | 6.1.7600.16385 | Winsock Network Diagnostic Helper Class
|
| | winsrpc.dll | 6.1.7600.16385 | WINS RPC LIBRARY
|
| | winsta.dll | 6.1.7601.17514 | Winstation Library
|
| | winsync.dll | 2007.94.7600.16385 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.7600.16385 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.7600.16385 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 6.1.7601.17514 | Microsoft Trust Verification APIs
|
| | winusb.dll | 6.1.7600.16385 | Windows USB Driver User Library
|
| | wkscli.dll | 6.1.7601.17514 | Workstation Service Client DLL
|
| | wksprtps.dll | 6.1.7600.16385 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 6.1.7600.16385 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 6.1.7600.16385 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 6.1.7600.16385 | Dot11 Connection Flows
|
| | wlandlg.dll | 6.1.7600.16385 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 6.1.7601.17514 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 6.1.7600.16385 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlaninst.dll | 6.1.7600.16385 | Windows NET Device Class Co-Installer for Wireless LAN
|
| | wlanmm.dll | 6.1.7600.16385 | Dot11 Media and AdHoc Managers
|
| | wlanmsm.dll | 6.1.7601.17514 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 6.1.7601.17514 | Wireless Preferred Networks
|
| | wlansec.dll | 6.1.7600.16385 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 6.1.7601.17514 | Wireless Profile UI
|
| | wlanutil.dll | 6.1.7600.16385 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 6.1.7601.17514 | Win32 LDAP API DLL
|
| | wlgpclnt.dll | 6.1.7600.16385 | 802.11 Group Policy Client
|
| | wls0wndh.dll | 6.1.7600.16385 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 6.1.7601.17514 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 6.1.7600.16385 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.7600.16385 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 6.1.7600.16385 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.7600.16385 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.7600.16385 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.7601.17514 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.7601.17514 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.7601.17514 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.7600.16385 | Windows Media Error Definitions (English)
|
| | wmi.dll | 6.1.7600.16385 | WMI DC and DP functionality
|
| | wmidx.dll | 12.0.7600.16385 | Windows Media Indexer DLL
|
| | wmiprop.dll | 6.1.7600.16385 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmnetmgr.dll | 12.0.7601.17514 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.7601.17514 | Windows Media Player
|
| | wmpcm.dll | 12.0.7600.16385 | Windows Media Player Compositing Mixer
|
| | wmpdui.dll | 12.0.7600.16385 | Windows Media Player UI Engine
|
| | wmpdxm.dll | 12.0.7601.17514 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.7601.17514 | Windows Media Player Effects
|
| | wmpencen.dll | 12.0.7601.17514 | Windows Media Player Encoding Module
|
| | wmphoto.dll | 6.1.7601.17514 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.7601.17514 | Windows Media Player Resources
|
| | wmpmde.dll | 12.0.7601.17514 | WMPMDE DLL
|
| | wmpps.dll | 12.0.7601.17514 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.7601.17514 | Windows Media Player Launcher
|
| | wmpsrcwp.dll | 12.0.7601.17514 | WMPSrcWp Module
|
| | wmsgapi.dll | 6.1.7600.16385 | WinLogon IPC Client
|
| | wmspdmod.dll | 6.1.7601.17514 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 6.1.7600.16385 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.7601.17514 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 6.1.7601.17514 | Windows Media Video Decoder
|
| | wmvdspa.dll | 6.1.7600.16385 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 6.1.7600.16385 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 6.1.7601.17514 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 6.1.7600.16385 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 6.1.7600.16385 | Windows Media Video Encoder
|
| | wow32.dll | 6.1.7600.16385 | Wow32
|
| | wpc.dll | 1.0.0.1 | WPC Settings Library
|
| | wpcao.dll | 6.1.7600.16385 | WPC Administrator Override
|
| | wpcsvc.dll | 1.0.0.1 | WPC Filtering Service
|
| | wpdshext.dll | 6.1.7601.17514 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 6.1.7601.17514 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 6.1.7601.17514 | WMDM Service Provider for Windows Portable Devices
|
| | wpdwcn.dll | 6.1.7601.17514 | Windows Portable Device WCN Wizard
|
| | ws2_32.dll | 6.1.7601.17514 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 6.1.7600.16385 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 6.1.7601.17514 | Windows Security Center API
|
| | wscinterop.dll | 6.1.7600.16385 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 6.1.7600.16385 | Windows Security Center ISV API
|
| | wscmisetup.dll | 6.1.7600.16385 | Installers for Winsock Transport and Name Space Providers
|
| | wscproxystub.dll | 6.1.7600.16385 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 6.1.7601.17514 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 6.1.7601.17514 | WSD Challenge Component
|
| | wsecedit.dll | 6.1.7600.16385 | Security Configuration UI Module
|
| | wshbth.dll | 6.1.7601.17514 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.8.7600.16385 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 6.1.7600.16385 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.8.7600.16385 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 6.1.7600.16385 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 6.1.7601.17514 | Windows Sockets Helper DLL
|
| | wshqos.dll | 6.1.7600.16385 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 6.1.7600.16385 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 6.1.7600.16385 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmanmigrationplugin.dll | 6.1.7600.16385 | WinRM Migration Plugin
|
| | wsmauto.dll | 6.1.7600.16385 | WSMAN Automation
|
| | wsmplpxy.dll | 6.1.7600.16385 | wsmplpxy
|
| | wsmres.dll | 6.1.7600.16385 | WSMan Resource DLL
|
| | wsmsvc.dll | 6.1.7601.17514 | WSMan Service
|
| | wsmwmipl.dll | 6.1.7600.16385 | WSMAN WMI Provider
|
| | wsnmp32.dll | 6.1.7601.17514 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 6.1.7600.16385 | Windows Socket 32-Bit DLL
|
| | wtsapi32.dll | 6.1.7601.17514 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 7.6.7600.320 | Windows Update Client API
|
| | wudriver.dll | 7.6.7600.320 | Windows Update WUDriver Stub
|
| | wups.dll | 7.6.7600.320 | Windows Update client proxy stub
|
| | wuwebv.dll | 7.6.7600.320 | Windows Update Vista Web Control
|
| | wvc.dll | 6.1.7601.17514 | Windows Visual Components
|
| | wwanapi.dll | 6.1.7600.16385 | Mbnapi
|
| | wwapi.dll | 8.1.2.0 | WWAN API
|
| | wzcdlg.dll | 6.1.7600.16385 | Windows Connect Now - Flash Config Enrollee
|
| | xinput9_1_0.dll | 6.1.7600.16385 | XNA Common Controller
|
| | xmlfilter.dll | 2008.0.7600.16385 | XML Filter
|
| | xmllite.dll | 1.3.1000.0 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 6.1.7600.16385 | Network Provisioning Service Client API
|
| | xolehlp.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsfilt.dll | 6.1.7600.16385 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 6.1.7601.17514 | XPS to GDI Converter
|
| | xpsprint.dll | 6.1.7601.17514 | XPS Printing DLL
|
| | xpsrasterservice.dll | 6.1.7601.17514 | XPS Rasterization Service Component
|
| | xpsservices.dll | 6.1.7601.17514 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 6.1.7600.16385 | Package Document Shell Extension Handler
|
| | xpssvcs.dll | 6.1.7600.16385 | Native Code Xps Services Library
|
| | xwizards.dll | 6.1.7600.16385 | Extensible Wizards Manager Module
|
| | xwreg.dll | 6.1.7600.16385 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 6.1.7600.16385 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 6.1.7600.16385 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 6.1.7601.17514 | Compressed (zipped) Folders
|
| | | |
|
| | OpenGL Properties:
|
| | | Vendor | NVIDIA Corporation
|
| | | Renderer | GeForce GT 520M/PCIe/SSE2
|
| | | Version | 4.5.0 NVIDIA 352.86
|
| | | Shading Language Version | 4.50 NVIDIA
|
| | | OpenGL DLL | 6.1.7600.16385(win7_rtm.090713-1255)
|
| | | Multitexture Texture Units | 4
|
| | | Occlusion Query Counter Bits | 32
|
| | | Sub-Pixel Precision | 8-bit
|
| | | Max Viewport Size | 16384 x 16384
|
| | | Max Cube Map Texture Size | 16384 x 16384
|
| | | Max Rectangle Texture Size | 16384 x 16384
|
| | | Max 3D Texture Size | 2048 x 2048 x 2048
|
| | | Max Anisotropy | 16
|
| | | Max Clipping Planes | 8
|
| | | Max Display-List Nesting Level | 64
|
| | | Max Draw Buffers | 8
|
| | | Max Evaluator Order | 8
|
| | | Max General Register Combiners | 8
|
| | | Max Light Sources | 8
|
| | | Max Pixel Map Table Size | 65536
|
| | | Min / Max Program Texel Offset | -8 / 7
|
| | | Max Texture Array Layers | 2048
|
| | | Max Texture LOD Bias | 15
|
| | | Max Vertex Array Range Element Size | 1048575
|
|
| | OpenGL Compliancy:
|
| | | OpenGL 1.1 | Yes (100%)
|
| | | OpenGL 1.2 | Yes (100%)
|
| | | OpenGL 1.3 | Yes (100%)
|
| | | OpenGL 1.4 | Yes (100%)
|
| | | OpenGL 1.5 | Yes (100%)
|
| | | OpenGL 2.0 | Yes (100%)
|
| | | OpenGL 2.1 | Yes (100%)
|
| | | OpenGL 3.0 | Yes (100%)
|
| | | OpenGL 3.1 | Yes (100%)
|
| | | OpenGL 3.2 | Yes (100%)
|
| | | OpenGL 3.3 | Yes (100%)
|
| | | OpenGL 4.0 | Yes (100%)
|
| | | OpenGL 4.1 | Yes (100%)
|
| | | OpenGL 4.2 | Yes (100%)
|
| | | OpenGL 4.3 | Yes (100%)
|
| | | OpenGL 4.4 | Yes (100%)
|
| | | OpenGL 4.5 | Yes (100%)
|
|
| | Max Stack Depth:
|
| | | Attribute Stack | 16
|
| | | Client Attribute Stack | 16
|
| | | Modelview Matrix Stack | 32
|
| | | Name Stack | 128
|
| | | Projection Matrix Stack | 4
|
| | | Texture Matrix Stack | 10
|
|
| | Draw Range Elements:
|
| | | Max Index Count | 1048576
|
| | | Max Vertex Count | 1048576
|
|
| | Extended Lighting Parameters:
|
| | | Max Shininess | 128
|
| | | Max Spot Exponent | 128
|
|
| | Transform Feedback:
|
| | | Max Interleaved Components | 128
|
| | | Max Separate Attributes | 4
|
| | | Max Separate Components | 4
|
|
| | Framebuffer Object:
|
| | | Max Color Attachments | 8
|
| | | Max Render Buffer Size | 16384 x 16384
|
|
| | Imaging:
|
| | | Max Color Matrix Stack Depth | 2
|
| | | Max Convolution Width / Height | 11 / 11
|
|
| | Vertex Shader:
|
| | | Max Uniform Vertex Components | 4096
|
| | | Max Varying Floats | 124
|
| | | Max Vertex Texture Image Units | 32
|
| | | Max Combined Texture Image Units | 192
|
|
| | Geometry Shader:
|
| | | Max Geometry Texture Units | 32
|
| | | Max Varying Components | 124
|
| | | Max Geometry Varying Components | 124
|
| | | Max Vertex Varying Components | 124
|
| | | Max Geometry Uniform Components | 2048
|
| | | Max Geometry Output Vertices | 1024
|
| | | Max Geometry Total Output Components | 1024
|
|
| | Fragment Shader:
|
| | | Max Uniform Fragment Components | 2048
|
|
| | Vertex Program:
|
| | | Max Local Parameters | 1024
|
| | | Max Environment Parameters | 256
|
| | | Max Program Matrices | 8
|
| | | Max Program Matrix Stack Depth | 1
|
| | | Max Tracking Matrices | 8
|
| | | Max Tracking Matrix Stack Depth | 1
|
| | | Max Vertex Attributes | 16
|
| | | Max Instructions | 16384
|
| | | Max Native Instructions | 16384
|
| | | Max Temporaries | 4096
|
| | | Max Native Temporaries | 4096
|
| | | Max Parameters | 1024
|
| | | Max Native Parameters | 1024
|
| | | Max Attributes | 16
|
| | | Max Native Attributes | 16
|
| | | Max Address Registers | 2
|
| | | Max Native Address Registers | 2
|
|
| | Fragment Program:
|
| | | Max Local Parameters | 512
|
| | | Max Environment Parameters | 256
|
| | | Max Texture Coordinates | 8
|
| | | Max Texture Image Units | 32
|
| | | Max Instructions | 16384
|
| | | Max Native Instructions | 16384
|
| | | Max Temporaries | 4096
|
| | | Max Native Temporaries | 4096
|
| | | Max Parameters | 1024
|
| | | Max Native Parameters | 1024
|
| | | Max Attributes | 16
|
| | | Max Native Attributes | 16
|
| | | Max Address Registers | 1
|
| | | Max Native Address Registers | 1
|
| | | Max ALU Instructions | 16384
|
| | | Max Native ALU Instructions | 16384
|
| | | Max Texture Instructions | 16384
|
| | | Max Native Texture Instructions | 16384
|
| | | Max Texture Indirections | 16384
|
| | | Max Native Texture Indirections | 16384
|
| | | Max Execution Instructions | 16777216
|
| | | Max Call Stack Depth | 32
|
| | | Max If Statement Depth | 64
|
| | | Max Loop Depth | 64
|
| | | Max Loop Count | 16777216
|
|
| | OpenGL Extensions:
|
| | | Total / Supported Extensions | 1008 / 337
|
| | | GL_3DFX_multisample | Not Supported
|
| | | GL_3DFX_tbuffer | Not Supported
|
| | | GL_3DFX_texture_compression_FXT1 | Not Supported
|
| | | GL_3DL_direct_texture_access2 | Not Supported
|
| | | GL_3Dlabs_multisample_transparency_id | Not Supported
|
| | | GL_3Dlabs_multisample_transparency_range | Not Supported
|
| | | GL_AMD_blend_minmax_factor | Not Supported
|
| | | GL_AMD_compressed_3DC_texture | Not Supported
|
| | | GL_AMD_compressed_ATC_texture | Not Supported
|
| | | GL_AMD_conservative_depth | Not Supported
|
| | | GL_AMD_debug_output | Not Supported
|
| | | GL_AMD_depth_clamp_separate | Not Supported
|
| | | GL_AMD_draw_buffers_blend | Not Supported
|
| | | GL_AMD_framebuffer_sample_positions | Not Supported
|
| | | GL_AMD_gcn_shader | Not Supported
|
| | | GL_AMD_gpu_shader_half_float | Not Supported
|
| | | GL_AMD_gpu_shader_half_float2 | Not Supported
|
| | | GL_AMD_gpu_shader_int64 | Not Supported
|
| | | GL_AMD_interleaved_elements | Not Supported
|
| | | GL_AMD_multi_draw_indirect | Supported
|
| | | GL_AMD_name_gen_delete | Not Supported
|
| | | GL_AMD_occlusion_query_event | Not Supported
|
| | | GL_AMD_performance_monitor | Not Supported
|
| | | GL_AMD_pinned_memory | Not Supported
|
| | | GL_AMD_program_binary_Z400 | Not Supported
|
| | | GL_AMD_query_buffer_object | Not Supported
|
| | | GL_AMD_sample_positions | Not Supported
|
| | | GL_AMD_seamless_cubemap_per_texture | Not Supported
|
| | | GL_AMD_shader_atomic_counter_ops | Not Supported
|
| | | GL_AMD_shader_stencil_export | Not Supported
|
| | | GL_AMD_shader_stencil_value_export | Not Supported
|
| | | GL_AMD_shader_trace | Not Supported
|
| | | GL_AMD_shader_trinary_minmax | Not Supported
|
| | | GL_AMD_sparse_texture | Not Supported
|
| | | GL_AMD_sparse_texture_pool | Not Supported
|
| | | GL_AMD_stencil_operation_extended | Not Supported
|
| | | GL_AMD_texture_compression_dxt6 | Not Supported
|
| | | GL_AMD_texture_compression_dxt7 | Not Supported
|
| | | GL_AMD_texture_cube_map_array | Not Supported
|
| | | GL_AMD_texture_texture4 | Not Supported
|
| | | GL_AMD_texture_tile_pool | Not Supported
|
| | | GL_AMD_transform_feedback3_lines_triangles | Not Supported
|
| | | GL_AMD_transform_feedback4 | Not Supported
|
| | | GL_AMD_vertex_shader_layer | Not Supported
|
| | | GL_AMD_vertex_shader_tessellator | Not Supported
|
| | | GL_AMD_vertex_shader_viewport_index | Not Supported
|
| | | GL_AMDX_debug_output | Not Supported
|
| | | GL_AMDX_name_gen_delete | Not Supported
|
| | | GL_AMDX_random_access_target | Not Supported
|
| | | GL_AMDX_vertex_shader_tessellator | Not Supported
|
| | | GL_ANDROID_extension_pack_es31a | Not Supported
|
| | | GL_ANGLE_depth_texture | Not Supported
|
| | | GL_ANGLE_framebuffer_blit | Not Supported
|
| | | GL_ANGLE_framebuffer_multisample | Not Supported
|
| | | GL_ANGLE_instanced_arrays | Not Supported
|
| | | GL_ANGLE_pack_reverse_row_order | Not Supported
|
| | | GL_ANGLE_program_binary | Not Supported
|
| | | GL_ANGLE_texture_compression_dxt1 | Not Supported
|
| | | GL_ANGLE_texture_compression_dxt3 | Not Supported
|
| | | GL_ANGLE_texture_compression_dxt5 | Not Supported
|
| | | GL_ANGLE_texture_usage | Not Supported
|
| | | GL_ANGLE_translated_shader_source | Not Supported
|
| | | GL_APPLE_aux_depth_stencil | Not Supported
|
| | | GL_APPLE_client_storage | Not Supported
|
| | | GL_APPLE_copy_texture_levels | Not Supported
|
| | | GL_APPLE_element_array | Not Supported
|
| | | GL_APPLE_fence | Not Supported
|
| | | GL_APPLE_float_pixels | Not Supported
|
| | | GL_APPLE_flush_buffer_range | Not Supported
|
| | | GL_APPLE_flush_render | Not Supported
|
| | | GL_APPLE_framebuffer_multisample | Not Supported
|
| | | GL_APPLE_object_purgeable | Not Supported
|
| | | GL_APPLE_packed_pixel | Not Supported
|
| | | GL_APPLE_packed_pixels | Not Supported
|
| | | GL_APPLE_pixel_buffer | Not Supported
|
| | | GL_APPLE_rgb_422 | Not Supported
|
| | | GL_APPLE_row_bytes | Not Supported
|
| | | GL_APPLE_specular_vector | Not Supported
|
| | | GL_APPLE_sync | Not Supported
|
| | | GL_APPLE_texture_2D_limited_npot | Not Supported
|
| | | GL_APPLE_texture_format_BGRA8888 | Not Supported
|
| | | GL_APPLE_texture_max_level | Not Supported
|
| | | GL_APPLE_texture_range | Not Supported
|
| | | GL_APPLE_transform_hint | Not Supported
|
| | | GL_APPLE_vertex_array_object | Not Supported
|
| | | GL_APPLE_vertex_array_range | Not Supported
|
| | | GL_APPLE_vertex_point_size | Not Supported
|
| | | GL_APPLE_vertex_program_evaluators | Not Supported
|
| | | GL_APPLE_ycbcr_422 | Not Supported
|
| | | GL_ARB_arrays_of_arrays | Supported
|
| | | GL_ARB_base_instance | Supported
|
| | | GL_ARB_bindless_texture | Not Supported
|
| | | GL_ARB_blend_func_extended | Supported
|
| | | GL_ARB_buffer_storage | Supported
|
| | | GL_ARB_cl_event | Not Supported
|
| | | GL_ARB_clear_buffer_object | Supported
|
| | | GL_ARB_clear_texture | Supported
|
| | | GL_ARB_clip_control | Supported
|
| | | GL_ARB_color_buffer_float | Supported
|
| | | GL_ARB_compatibility | Supported
|
| | | GL_ARB_compressed_texture_pixel_storage | Supported
|
| | | GL_ARB_compute_shader | Supported
|
| | | GL_ARB_compute_variable_group_size | Supported
|
| | | GL_ARB_conditional_render_inverted | Supported
|
| | | GL_ARB_conservative_depth | Supported
|
| | | GL_ARB_context_flush_control | Not Supported
|
| | | GL_ARB_copy_buffer | Supported
|
| | | GL_ARB_copy_image | Supported
|
| | | GL_ARB_cull_distance | Supported
|
| | | GL_ARB_debug_group | Not Supported
|
| | | GL_ARB_debug_label | Not Supported
|
| | | GL_ARB_debug_output | Supported
|
| | | GL_ARB_debug_output2 | Not Supported
|
| | | GL_ARB_depth_buffer_float | Supported
|
| | | GL_ARB_depth_clamp | Supported
|
| | | GL_ARB_depth_texture | Supported
|
| | | GL_ARB_derivative_control | Supported
|
| | | GL_ARB_direct_state_access | Supported
|
| | | GL_ARB_draw_buffers | Supported
|
| | | GL_ARB_draw_buffers_blend | Supported
|
| | | GL_ARB_draw_elements_base_vertex | Supported
|
| | | GL_ARB_draw_indirect | Supported
|
| | | GL_ARB_draw_instanced | Supported
|
| | | GL_ARB_enhanced_layouts | Supported
|
| | | GL_ARB_ES2_compatibility | Supported
|
| | | GL_ARB_ES3_1_compatibility | Supported
|
| | | GL_ARB_ES3_compatibility | Supported
|
| | | GL_ARB_explicit_attrib_location | Supported
|
| | | GL_ARB_explicit_uniform_location | Supported
|
| | | GL_ARB_fragment_coord_conventions | Supported
|
| | | GL_ARB_fragment_layer_viewport | Supported
|
| | | GL_ARB_fragment_program | Supported
|
| | | GL_ARB_fragment_program_shadow | Supported
|
| | | GL_ARB_fragment_shader | Supported
|
| | | GL_ARB_fragment_shader_interlock | Not Supported
|
| | | GL_ARB_framebuffer_no_attachments | Supported
|
| | | GL_ARB_framebuffer_object | Supported
|
| | | GL_ARB_framebuffer_sRGB | Supported
|
| | | GL_ARB_geometry_shader4 | Supported
|
| | | GL_ARB_get_program_binary | Supported
|
| | | GL_ARB_get_texture_sub_image | Supported
|
| | | GL_ARB_gpu_shader_fp64 | Supported
|
| | | GL_ARB_gpu_shader5 | Supported
|
| | | GL_ARB_half_float_pixel | Supported
|
| | | GL_ARB_half_float_vertex | Supported
|
| | | GL_ARB_imaging | Supported
|
| | | GL_ARB_indirect_parameters | Supported
|
| | | GL_ARB_instanced_arrays | Supported
|
| | | GL_ARB_internalformat_query | Supported
|
| | | GL_ARB_internalformat_query2 | Supported
|
| | | GL_ARB_invalidate_subdata | Supported
|
| | | GL_ARB_make_current_read | Not Supported
|
| | | GL_ARB_map_buffer_alignment | Supported
|
| | | GL_ARB_map_buffer_range | Supported
|
| | | GL_ARB_matrix_palette | Not Supported
|
| | | GL_ARB_multi_bind | Supported
|
| | | GL_ARB_multi_draw_indirect | Supported
|
| | | GL_ARB_multisample | Supported
|
| | | GL_ARB_multitexture | Supported
|
| | | GL_ARB_occlusion_query | Supported
|
| | | GL_ARB_occlusion_query2 | Supported
|
| | | GL_ARB_pipeline_statistics_query | Supported
|
| | | GL_ARB_pixel_buffer_object | Supported
|
| | | GL_ARB_point_parameters | Supported
|
| | | GL_ARB_point_sprite | Supported
|
| | | GL_ARB_program_interface_query | Supported
|
| | | GL_ARB_provoking_vertex | Supported
|
| | | GL_ARB_query_buffer_object | Supported
|
| | | GL_ARB_robust_buffer_access_behavior | Supported
|
| | | GL_ARB_robustness | Supported
|
| | | GL_ARB_robustness_isolation | Not Supported
|
| | | GL_ARB_sample_shading | Supported
|
| | | GL_ARB_sampler_objects | Supported
|
| | | GL_ARB_seamless_cube_map | Supported
|
| | | GL_ARB_seamless_cubemap_per_texture | Not Supported
|
| | | GL_ARB_separate_shader_objects | Supported
|
| | | GL_ARB_shader_atomic_counters | Supported
|
| | | GL_ARB_shader_bit_encoding | Supported
|
| | | GL_ARB_shader_draw_parameters | Supported
|
| | | GL_ARB_shader_group_vote | Supported
|
| | | GL_ARB_shader_image_load_store | Supported
|
| | | GL_ARB_shader_image_size | Supported
|
| | | GL_ARB_shader_objects | Supported
|
| | | GL_ARB_shader_precision | Supported
|
| | | GL_ARB_shader_stencil_export | Not Supported
|
| | | GL_ARB_shader_storage_buffer_object | Supported
|
| | | GL_ARB_shader_subroutine | Supported
|
| | | GL_ARB_shader_texture_image_samples | Supported
|
| | | GL_ARB_shader_texture_lod | Supported
|
| | | GL_ARB_shading_language_100 | Supported
|
| | | GL_ARB_shading_language_120 | Not Supported
|
| | | GL_ARB_shading_language_420pack | Supported
|
| | | GL_ARB_shading_language_include | Supported
|
| | | GL_ARB_shading_language_packing | Supported
|
| | | GL_ARB_shadow | Supported
|
| | | GL_ARB_shadow_ambient | Not Supported
|
| | | GL_ARB_sparse_buffer | Supported
|
| | | GL_ARB_sparse_texture | Supported
|
| | | GL_ARB_stencil_texturing | Supported
|
| | | GL_ARB_swap_buffers | Not Supported
|
| | | GL_ARB_sync | Supported
|
| | | GL_ARB_tessellation_shader | Supported
|
| | | GL_ARB_texture_barrier | Supported
|
| | | GL_ARB_texture_border_clamp | Supported
|
| | | GL_ARB_texture_buffer_object | Supported
|
| | | GL_ARB_texture_buffer_object_rgb32 | Supported
|
| | | GL_ARB_texture_buffer_range | Supported
|
| | | GL_ARB_texture_compression | Supported
|
| | | GL_ARB_texture_compression_bptc | Supported
|
| | | GL_ARB_texture_compression_rgtc | Supported
|
| | | GL_ARB_texture_compression_rtgc | Not Supported
|
| | | GL_ARB_texture_cube_map | Supported
|
| | | GL_ARB_texture_cube_map_array | Supported
|
| | | GL_ARB_texture_env_add | Supported
|
| | | GL_ARB_texture_env_combine | Supported
|
| | | GL_ARB_texture_env_crossbar | Supported
|
| | | GL_ARB_texture_env_dot3 | Supported
|
| | | GL_ARB_texture_float | Supported
|
| | | GL_ARB_texture_gather | Supported
|
| | | GL_ARB_texture_mirror_clamp_to_edge | Supported
|
| | | GL_ARB_texture_mirrored_repeat | Supported
|
| | | GL_ARB_texture_multisample | Supported
|
| | | GL_ARB_texture_non_power_of_two | Supported
|
| | | GL_ARB_texture_query_levels | Supported
|
| | | GL_ARB_texture_query_lod | Supported
|
| | | GL_ARB_texture_rectangle | Supported
|
| | | GL_ARB_texture_rg | Supported
|
| | | GL_ARB_texture_rgb10_a2ui | Supported
|
| | | GL_ARB_texture_snorm | Not Supported
|
| | | GL_ARB_texture_stencil8 | Supported
|
| | | GL_ARB_texture_storage | Supported
|
| | | GL_ARB_texture_storage_multisample | Supported
|
| | | GL_ARB_texture_swizzle | Supported
|
| | | GL_ARB_texture_view | Supported
|
| | | GL_ARB_timer_query | Supported
|
| | | GL_ARB_transform_feedback_instanced | Supported
|
| | | GL_ARB_transform_feedback_overflow_query | Supported
|
| | | GL_ARB_transform_feedback2 | Supported
|
| | | GL_ARB_transform_feedback3 | Supported
|
| | | GL_ARB_transpose_matrix | Supported
|
| | | GL_ARB_uber_buffers | Not Supported
|
| | | GL_ARB_uber_mem_image | Not Supported
|
| | | GL_ARB_uber_vertex_array | Not Supported
|
| | | GL_ARB_uniform_buffer_object | Supported
|
| | | GL_ARB_vertex_array_bgra | Supported
|
| | | GL_ARB_vertex_array_object | Supported
|
| | | GL_ARB_vertex_attrib_64bit | Supported
|
| | | GL_ARB_vertex_attrib_binding | Supported
|
| | | GL_ARB_vertex_blend | Not Supported
|
| | | GL_ARB_vertex_buffer_object | Supported
|
| | | GL_ARB_vertex_program | Supported
|
| | | GL_ARB_vertex_shader | Supported
|
| | | GL_ARB_vertex_type_10f_11f_11f_rev | Supported
|
| | | GL_ARB_vertex_type_2_10_10_10_rev | Supported
|
| | | GL_ARB_viewport_array | Supported
|
| | | GL_ARB_window_pos | Supported
|
| | | GL_ARM_mali_program_binary | Not Supported
|
| | | GL_ARM_mali_shader_binary | Not Supported
|
| | | GL_ARM_rgba8 | Not Supported
|
| | | GL_ARM_shader_framebuffer_fetch | Not Supported
|
| | | GL_ARM_shader_framebuffer_fetch_depth_stencil | Not Supported
|
| | | GL_ATI_array_rev_comps_in_4_bytes | Not Supported
|
| | | GL_ATI_blend_equation_separate | Not Supported
|
| | | GL_ATI_blend_weighted_minmax | Not Supported
|
| | | GL_ATI_draw_buffers | Supported
|
| | | GL_ATI_element_array | Not Supported
|
| | | GL_ATI_envmap_bumpmap | Not Supported
|
| | | GL_ATI_fragment_shader | Not Supported
|
| | | GL_ATI_lock_texture | Not Supported
|
| | | GL_ATI_map_object_buffer | Not Supported
|
| | | GL_ATI_meminfo | Not Supported
|
| | | GL_ATI_pixel_format_float | Not Supported
|
| | | GL_ATI_pn_triangles | Not Supported
|
| | | GL_ATI_point_cull_mode | Not Supported
|
| | | GL_ATI_separate_stencil | Not Supported
|
| | | GL_ATI_shader_texture_lod | Not Supported
|
| | | GL_ATI_text_fragment_shader | Not Supported
|
| | | GL_ATI_texture_compression_3dc | Not Supported
|
| | | GL_ATI_texture_env_combine3 | Not Supported
|
| | | GL_ATI_texture_float | Supported
|
| | | GL_ATI_texture_mirror_once | Supported
|
| | | GL_ATI_vertex_array_object | Not Supported
|
| | | GL_ATI_vertex_attrib_array_object | Not Supported
|
| | | GL_ATI_vertex_blend | Not Supported
|
| | | GL_ATI_vertex_shader | Not Supported
|
| | | GL_ATI_vertex_streams | Not Supported
|
| | | GL_ATIX_pn_triangles | Not Supported
|
| | | GL_ATIX_texture_env_combine3 | Not Supported
|
| | | GL_ATIX_texture_env_route | Not Supported
|
| | | GL_ATIX_vertex_shader_output_point_size | Not Supported
|
| | | GL_Autodesk_facet_normal | Not Supported
|
| | | GL_Autodesk_valid_back_buffer_hint | Not Supported
|
| | | GL_CR_bounding_box | Not Supported
|
| | | GL_CR_cursor_position | Not Supported
|
| | | GL_CR_head_spu_name | Not Supported
|
| | | GL_CR_performance_info | Not Supported
|
| | | GL_CR_print_string | Not Supported
|
| | | GL_CR_readback_barrier_size | Not Supported
|
| | | GL_CR_saveframe | Not Supported
|
| | | GL_CR_server_id_sharing | Not Supported
|
| | | GL_CR_server_matrix | Not Supported
|
| | | GL_CR_state_parameter | Not Supported
|
| | | GL_CR_synchronization | Not Supported
|
| | | GL_CR_tile_info | Not Supported
|
| | | GL_CR_tilesort_info | Not Supported
|
| | | GL_CR_window_size | Not Supported
|
| | | GL_DIMD_YUV | Not Supported
|
| | | GL_DMP_shader_binary | Not Supported
|
| | | GL_EXT_422_pixels | Not Supported
|
| | | GL_EXT_abgr | Supported
|
| | | GL_EXT_bgra | Supported
|
| | | GL_EXT_bindable_uniform | Supported
|
| | | GL_EXT_blend_color | Supported
|
| | | GL_EXT_blend_equation_separate | Supported
|
| | | GL_EXT_blend_func_separate | Supported
|
| | | GL_EXT_blend_logic_op | Not Supported
|
| | | GL_EXT_blend_minmax | Supported
|
| | | GL_EXT_blend_subtract | Supported
|
| | | GL_EXT_Cg_shader | Supported
|
| | | GL_EXT_clip_control | Not Supported
|
| | | GL_EXT_clip_volume_hint | Not Supported
|
| | | GL_EXT_cmyka | Not Supported
|
| | | GL_EXT_color_buffer_float | Not Supported
|
| | | GL_EXT_color_buffer_half_float | Not Supported
|
| | | GL_EXT_color_matrix | Not Supported
|
| | | GL_EXT_color_subtable | Not Supported
|
| | | GL_EXT_color_table | Not Supported
|
| | | GL_EXT_compiled_vertex_array | Supported
|
| | | GL_EXT_convolution | Not Supported
|
| | | GL_EXT_convolution_border_modes | Not Supported
|
| | | GL_EXT_coordinate_frame | Not Supported
|
| | | GL_EXT_copy_buffer | Not Supported
|
| | | GL_EXT_copy_image | Not Supported
|
| | | GL_EXT_copy_texture | Not Supported
|
| | | GL_EXT_cull_vertex | Not Supported
|
| | | GL_EXT_debug_label | Not Supported
|
| | | GL_EXT_debug_marker | Not Supported
|
| | | GL_EXT_depth_bounds_test | Supported
|
| | | GL_EXT_depth_buffer_float | Not Supported
|
| | | GL_EXT_direct_state_access | Supported
|
| | | GL_EXT_discard_framebuffer | Not Supported
|
| | | GL_EXT_disjoint_timer_query | Not Supported
|
| | | GL_EXT_draw_buffers | Not Supported
|
| | | GL_EXT_draw_buffers_indexed | Not Supported
|
| | | GL_EXT_draw_buffers2 | Supported
|
| | | GL_EXT_draw_indirect | Not Supported
|
| | | GL_EXT_draw_instanced | Supported
|
| | | GL_EXT_draw_range_elements | Supported
|
| | | GL_EXT_fog_coord | Supported
|
| | | GL_EXT_fog_function | Not Supported
|
| | | GL_EXT_fog_offset | Not Supported
|
| | | GL_EXT_frag_depth | Not Supported
|
| | | GL_EXT_fragment_lighting | Not Supported
|
| | | GL_EXT_framebuffer_blit | Supported
|
| | | GL_EXT_framebuffer_multisample | Supported
|
| | | GL_EXT_framebuffer_multisample_blit_scaled | Supported
|
| | | GL_EXT_framebuffer_object | Supported
|
| | | GL_EXT_framebuffer_sRGB | Supported
|
| | | GL_EXT_generate_mipmap | Not Supported
|
| | | GL_EXT_geometry_point_size | Not Supported
|
| | | GL_EXT_geometry_shader | Not Supported
|
| | | GL_EXT_geometry_shader4 | Supported
|
| | | GL_EXT_glx_stereo_tree | Not Supported
|
| | | GL_EXT_gpu_program_parameters | Supported
|
| | | GL_EXT_gpu_shader_fp64 | Not Supported
|
| | | GL_EXT_gpu_shader4 | Supported
|
| | | GL_EXT_gpu_shader5 | Not Supported
|
| | | GL_EXT_histogram | Not Supported
|
| | | GL_EXT_import_sync_object | Supported
|
| | | GL_EXT_index_array_formats | Not Supported
|
| | | GL_EXT_index_func | Not Supported
|
| | | GL_EXT_index_material | Not Supported
|
| | | GL_EXT_index_texture | Not Supported
|
| | | GL_EXT_instanced_arrays | Not Supported
|
| | | GL_EXT_interlace | Not Supported
|
| | | GL_EXT_light_texture | Not Supported
|
| | | GL_EXT_map_buffer_range | Not Supported
|
| | | GL_EXT_misc_attribute | Not Supported
|
| | | GL_EXT_multi_draw_arrays | Supported
|
| | | GL_EXT_multisample | Not Supported
|
| | | GL_EXT_multisampled_render_to_texture | Not Supported
|
| | | GL_EXT_multiview_draw_buffers | Not Supported
|
| | | GL_EXT_occlusion_query_boolean | Not Supported
|
| | | GL_EXT_packed_depth_stencil | Supported
|
| | | GL_EXT_packed_float | Supported
|
| | | GL_EXT_packed_pixels | Supported
|
| | | GL_EXT_packed_pixels_12 | Not Supported
|
| | | GL_EXT_paletted_texture | Not Supported
|
| | | GL_EXT_pixel_buffer_object | Supported
|
| | | GL_EXT_pixel_format | Not Supported
|
| | | GL_EXT_pixel_texture | Not Supported
|
| | | GL_EXT_pixel_transform | Not Supported
|
| | | GL_EXT_pixel_transform_color_table | Not Supported
|
| | | GL_EXT_point_parameters | Supported
|
| | | GL_EXT_polygon_offset | Not Supported
|
| | | GL_EXT_polygon_offset_clamp | Supported
|
| | | GL_EXT_post_depth_coverage | Not Supported
|
| | | GL_EXT_primitive_bounding_box | Not Supported
|
| | | GL_EXT_provoking_vertex | Supported
|
| | | GL_EXT_pvrtc_sRGB | Not Supported
|
| | | GL_EXT_raster_multisample | Not Supported
|
| | | GL_EXT_read_format_bgra | Not Supported
|
| | | GL_EXT_rescale_normal | Supported
|
| | | GL_EXT_robustness | Not Supported
|
| | | GL_EXT_scene_marker | Not Supported
|
| | | GL_EXT_secondary_color | Supported
|
| | | GL_EXT_separate_shader_objects | Supported
|
| | | GL_EXT_separate_specular_color | Supported
|
| | | GL_EXT_shader_atomic_counters | Not Supported
|
| | | GL_EXT_shader_framebuffer_fetch | Not Supported
|
| | | GL_EXT_shader_image_load_formatted | Not Supported
|
| | | GL_EXT_shader_image_load_store | Supported
|
| | | GL_EXT_shader_implicit_conversions | Not Supported
|
| | | GL_EXT_shader_integer_mix | Supported
|
| | | GL_EXT_shader_io_blocks | Not Supported
|
| | | GL_EXT_shader_pixel_local_storage | Not Supported
|
| | | GL_EXT_shader_subroutine | Not Supported
|
| | | GL_EXT_shader_texture_lod | Not Supported
|
| | | GL_EXT_shadow_funcs | Supported
|
| | | GL_EXT_shadow_samplers | Not Supported
|
| | | GL_EXT_shared_texture_palette | Not Supported
|
| | | GL_EXT_sparse_texture2 | Not Supported
|
| | | GL_EXT_sRGB | Not Supported
|
| | | GL_EXT_sRGB_write_control | Not Supported
|
| | | GL_EXT_static_vertex_array | Not Supported
|
| | | GL_EXT_stencil_clear_tag | Not Supported
|
| | | GL_EXT_stencil_two_side | Supported
|
| | | GL_EXT_stencil_wrap | Supported
|
| | | GL_EXT_subtexture | Not Supported
|
| | | GL_EXT_swap_control | Not Supported
|
| | | GL_EXT_tessellation_point_size | Not Supported
|
| | | GL_EXT_tessellation_shader | Not Supported
|
| | | GL_EXT_texgen_reflection | Not Supported
|
| | | GL_EXT_texture | Not Supported
|
| | | GL_EXT_texture_array | Supported
|
| | | GL_EXT_texture_border_clamp | Not Supported
|
| | | GL_EXT_texture_buffer | Not Supported
|
| | | GL_EXT_texture_buffer_object | Supported
|
| | | GL_EXT_texture_buffer_object_rgb32 | Not Supported
|
| | | GL_EXT_texture_color_table | Not Supported
|
| | | GL_EXT_texture_compression_bptc | Not Supported
|
| | | GL_EXT_texture_compression_dxt1 | Supported
|
| | | GL_EXT_texture_compression_latc | Supported
|
| | | GL_EXT_texture_compression_rgtc | Supported
|
| | | GL_EXT_texture_compression_s3tc | Supported
|
| | | GL_EXT_texture_cube_map | Supported
|
| | | GL_EXT_texture_cube_map_array | Not Supported
|
| | | GL_EXT_texture_edge_clamp | Supported
|
| | | GL_EXT_texture_env | Not Supported
|
| | | GL_EXT_texture_env_add | Supported
|
| | | GL_EXT_texture_env_combine | Supported
|
| | | GL_EXT_texture_env_dot3 | Supported
|
| | | GL_EXT_texture_filter_anisotropic | Supported
|
| | | GL_EXT_texture_filter_minmax | Not Supported
|
| | | GL_EXT_texture_format_BGRA8888 | Not Supported
|
| | | GL_EXT_texture_integer | Supported
|
| | | GL_EXT_texture_lod | Supported
|
| | | GL_EXT_texture_lod_bias | Supported
|
| | | GL_EXT_texture_mirror_clamp | Supported
|
| | | GL_EXT_texture_object | Supported
|
| | | GL_EXT_texture_perturb_normal | Not Supported
|
| | | GL_EXT_texture_rectangle | Not Supported
|
| | | GL_EXT_texture_rg | Not Supported
|
| | | GL_EXT_texture_shared_exponent | Supported
|
| | | GL_EXT_texture_snorm | Not Supported
|
| | | GL_EXT_texture_sRGB | Supported
|
| | | GL_EXT_texture_sRGB_decode | Supported
|
| | | GL_EXT_texture_storage | Supported
|
| | | GL_EXT_texture_swizzle | Supported
|
| | | GL_EXT_texture_type_2_10_10_10_REV | Not Supported
|
| | | GL_EXT_texture_view | Not Supported
|
| | | GL_EXT_texture3D | Supported
|
| | | GL_EXT_texture4D | Not Supported
|
| | | GL_EXT_timer_query | Supported
|
| | | GL_EXT_transform_feedback | Not Supported
|
| | | GL_EXT_transform_feedback2 | Supported
|
| | | GL_EXT_transform_feedback3 | Not Supported
|
| | | GL_EXT_unpack_subimage | Not Supported
|
| | | GL_EXT_vertex_array | Supported
|
| | | GL_EXT_vertex_array_bgra | Supported
|
| | | GL_EXT_vertex_array_set | Not Supported
|
| | | GL_EXT_vertex_array_setXXX | Not Supported
|
| | | GL_EXT_vertex_attrib_64bit | Supported
|
| | | GL_EXT_vertex_shader | Not Supported
|
| | | GL_EXT_vertex_weighting | Not Supported
|
| | | GL_EXT_x11_sync_object | Not Supported
|
| | | GL_EXTX_framebuffer_mixed_formats | Supported
|
| | | GL_EXTX_packed_depth_stencil | Not Supported
|
| | | GL_FGL_lock_texture | Not Supported
|
| | | GL_FJ_shader_binary_GCCSO | Not Supported
|
| | | GL_GL2_geometry_shader | Not Supported
|
| | | GL_GREMEDY_frame_terminator | Not Supported
|
| | | GL_GREMEDY_string_marker | Not Supported
|
| | | GL_HP_convolution_border_modes | Not Supported
|
| | | GL_HP_image_transform | Not Supported
|
| | | GL_HP_occlusion_test | Not Supported
|
| | | GL_HP_texture_lighting | Not Supported
|
| | | GL_I3D_argb | Not Supported
|
| | | GL_I3D_color_clamp | Not Supported
|
| | | GL_I3D_interlace_read | Not Supported
|
| | | GL_IBM_clip_check | Not Supported
|
| | | GL_IBM_cull_vertex | Not Supported
|
| | | GL_IBM_load_named_matrix | Not Supported
|
| | | GL_IBM_multi_draw_arrays | Not Supported
|
| | | GL_IBM_multimode_draw_arrays | Not Supported
|
| | | GL_IBM_occlusion_cull | Not Supported
|
| | | GL_IBM_pixel_filter_hint | Not Supported
|
| | | GL_IBM_rasterpos_clip | Supported
|
| | | GL_IBM_rescale_normal | Not Supported
|
| | | GL_IBM_static_data | Not Supported
|
| | | GL_IBM_texture_clamp_nodraw | Not Supported
|
| | | GL_IBM_texture_mirrored_repeat | Supported
|
| | | GL_IBM_vertex_array_lists | Not Supported
|
| | | GL_IBM_YCbCr | Not Supported
|
| | | GL_IMG_multisampled_render_to_texture | Not Supported
|
| | | GL_IMG_program_binary | Not Supported
|
| | | GL_IMG_read_format | Not Supported
|
| | | GL_IMG_sgx_binary | Not Supported
|
| | | GL_IMG_shader_binary | Not Supported
|
| | | GL_IMG_texture_compression_pvrtc | Not Supported
|
| | | GL_IMG_texture_compression_pvrtc2 | Not Supported
|
| | | GL_IMG_texture_env_enhanced_fixed_function | Not Supported
|
| | | GL_IMG_texture_format_BGRA8888 | Not Supported
|
| | | GL_IMG_user_clip_plane | Not Supported
|
| | | GL_IMG_vertex_program | Not Supported
|
| | | GL_INGR_blend_func_separate | Not Supported
|
| | | GL_INGR_color_clamp | Not Supported
|
| | | GL_INGR_interlace_read | Not Supported
|
| | | GL_INGR_multiple_palette | Not Supported
|
| | | GL_INTEL_compute_shader_lane_shift | Not Supported
|
| | | GL_INTEL_conservative_rasterization | Not Supported
|
| | | GL_INTEL_fragment_shader_ordering | Not Supported
|
| | | GL_INTEL_fragment_shader_span_sharing | Not Supported
|
| | | GL_INTEL_image_serialize | Not Supported
|
| | | GL_INTEL_map_texture | Not Supported
|
| | | GL_INTEL_multi_rate_fragment_shader | Not Supported
|
| | | GL_INTEL_parallel_arrays | Not Supported
|
| | | GL_INTEL_performance_queries | Not Supported
|
| | | GL_INTEL_performance_query | Not Supported
|
| | | GL_INTEL_texture_scissor | Not Supported
|
| | | GL_KHR_blend_equation_advanced | Supported
|
| | | GL_KHR_blend_equation_advanced_coherent | Not Supported
|
| | | GL_KHR_context_flush_control | Supported
|
| | | GL_KHR_debug | Supported
|
| | | GL_KHR_robust_buffer_access_behavior | Supported
|
| | | GL_KHR_robustness | Supported
|
| | | GL_KHR_texture_compression_astc_hdr | Not Supported
|
| | | GL_KHR_texture_compression_astc_ldr | Not Supported
|
| | | GL_KTX_buffer_region | Supported
|
| | | GL_MESA_pack_invert | Not Supported
|
| | | GL_MESA_program_debug | Not Supported
|
| | | GL_MESA_resize_buffers | Not Supported
|
| | | GL_MESA_texture_array | Not Supported
|
| | | GL_MESA_texture_signed_rgba | Not Supported
|
| | | GL_MESA_window_pos | Not Supported
|
| | | GL_MESA_ycbcr_texture | Not Supported
|
| | | GL_MESAX_texture_float | Not Supported
|
| | | GL_MESAX_texture_stack | Not Supported
|
| | | GL_MTX_fragment_shader | Not Supported
|
| | | GL_MTX_precision_dpi | Not Supported
|
| | | GL_NV_3dvision_settings | Not Supported
|
| | | GL_NV_alpha_test | Not Supported
|
| | | GL_NV_bgr | Not Supported
|
| | | GL_NV_bindless_multi_draw_indirect | Supported
|
| | | GL_NV_bindless_multi_draw_indirect_count | Supported
|
| | | GL_NV_bindless_texture | Not Supported
|
| | | GL_NV_blend_equation_advanced | Supported
|
| | | GL_NV_blend_equation_advanced_coherent | Not Supported
|
| | | GL_NV_blend_minmax | Not Supported
|
| | | GL_NV_blend_square | Supported
|
| | | GL_NV_centroid_sample | Not Supported
|
| | | GL_NV_command_list | Supported
|
| | | GL_NV_complex_primitives | Not Supported
|
| | | GL_NV_compute_program5 | Supported
|
| | | GL_NV_conditional_render | Supported
|
| | | GL_NV_conservative_raster | Not Supported
|
| | | GL_NV_copy_buffer | Not Supported
|
| | | GL_NV_copy_depth_to_color | Supported
|
| | | GL_NV_copy_image | Supported
|
| | | GL_NV_coverage_sample | Not Supported
|
| | | GL_NV_deep_texture3D | Not Supported
|
| | | GL_NV_depth_buffer_float | Supported
|
| | | GL_NV_depth_clamp | Supported
|
| | | GL_NV_depth_nonlinear | Not Supported
|
| | | GL_NV_depth_range_unclamped | Not Supported
|
| | | GL_NV_draw_buffers | Not Supported
|
| | | GL_NV_draw_instanced | Not Supported
|
| | | GL_NV_draw_texture | Supported
|
| | | GL_NV_EGL_stream_consumer_external | Not Supported
|
| | | GL_NV_ES1_1_compatibility | Supported
|
| | | GL_NV_ES3_1_compatibility | Supported
|
| | | GL_NV_evaluators | Not Supported
|
| | | GL_NV_explicit_attrib_location | Not Supported
|
| | | GL_NV_explicit_multisample | Supported
|
| | | GL_NV_fbo_color_attachments | Not Supported
|
| | | GL_NV_fence | Supported
|
| | | GL_NV_fill_rectangle | Not Supported
|
| | | GL_NV_float_buffer | Supported
|
| | | GL_NV_fog_distance | Supported
|
| | | GL_NV_fragdepth | Not Supported
|
| | | GL_NV_fragment_coverage_to_color | Not Supported
|
| | | GL_NV_fragment_program | Supported
|
| | | GL_NV_fragment_program_option | Supported
|
| | | GL_NV_fragment_program2 | Supported
|
| | | GL_NV_fragment_program4 | Not Supported
|
| | | GL_NV_fragment_shader_interlock | Not Supported
|
| | | GL_NV_framebuffer_blit | Not Supported
|
| | | GL_NV_framebuffer_mixed_samples | Not Supported
|
| | | GL_NV_framebuffer_multisample | Not Supported
|
| | | GL_NV_framebuffer_multisample_coverage | Supported
|
| | | GL_NV_framebuffer_multisample_ex | Not Supported
|
| | | GL_NV_generate_mipmap_sRGB | Not Supported
|
| | | GL_NV_geometry_program4 | Not Supported
|
| | | GL_NV_geometry_shader_passthrough | Not Supported
|
| | | GL_NV_geometry_shader4 | Supported
|
| | | GL_NV_gpu_program_fp64 | Supported
|
| | | GL_NV_gpu_program4 | Supported
|
| | | GL_NV_gpu_program4_1 | Supported
|
| | | GL_NV_gpu_program5 | Supported
|
| | | GL_NV_gpu_program5_mem_extended | Supported
|
| | | GL_NV_gpu_shader5 | Supported
|
| | | GL_NV_half_float | Supported
|
| | | GL_NV_instanced_arrays | Not Supported
|
| | | GL_NV_internalformat_sample_query | Supported
|
| | | GL_NV_light_max_exponent | Supported
|
| | | GL_NV_multisample_coverage | Supported
|
| | | GL_NV_multisample_filter_hint | Supported
|
| | | GL_NV_non_square_matrices | Not Supported
|
| | | GL_NV_occlusion_query | Supported
|
| | | GL_NV_pack_subimage | Not Supported
|
| | | GL_NV_packed_depth_stencil | Supported
|
| | | GL_NV_packed_float | Not Supported
|
| | | GL_NV_packed_float_linear | Not Supported
|
| | | GL_NV_parameter_buffer_object | Supported
|
| | | GL_NV_parameter_buffer_object2 | Supported
|
| | | GL_NV_path_rendering | Supported
|
| | | GL_NV_path_rendering_shared_edge | Not Supported
|
| | | GL_NV_pixel_buffer_object | Not Supported
|
| | | GL_NV_pixel_data_range | Supported
|
| | | GL_NV_platform_binary | Not Supported
|
| | | GL_NV_point_sprite | Supported
|
| | | GL_NV_present_video | Not Supported
|
| | | GL_NV_primitive_restart | Supported
|
| | | GL_NV_read_buffer | Not Supported
|
| | | GL_NV_read_buffer_front | Not Supported
|
| | | GL_NV_read_depth | Not Supported
|
| | | GL_NV_read_depth_stencil | Not Supported
|
| | | GL_NV_read_stencil | Not Supported
|
| | | GL_NV_register_combiners | Supported
|
| | | GL_NV_register_combiners2 | Supported
|
| | | GL_NV_sample_locations | Not Supported
|
| | | GL_NV_sample_mask_override_coverage | Not Supported
|
| | | GL_NV_shader_atomic_counters | Supported
|
| | | GL_NV_shader_atomic_float | Supported
|
| | | GL_NV_shader_atomic_fp16_vector | Not Supported
|
| | | GL_NV_shader_atomic_int64 | Not Supported
|
| | | GL_NV_shader_buffer_load | Supported
|
| | | GL_NV_shader_buffer_store | Not Supported
|
| | | GL_NV_shader_storage_buffer_object | Supported
|
| | | GL_NV_shader_thread_group | Supported
|
| | | GL_NV_shader_thread_shuffle | Not Supported
|
| | | GL_NV_shadow_samplers_array | Not Supported
|
| | | GL_NV_shadow_samplers_cube | Not Supported
|
| | | GL_NV_sRGB_formats | Not Supported
|
| | | GL_NV_tessellation_program5 | Not Supported
|
| | | GL_NV_texgen_emboss | Not Supported
|
| | | GL_NV_texgen_reflection | Supported
|
| | | GL_NV_texture_array | Not Supported
|
| | | GL_NV_texture_barrier | Supported
|
| | | GL_NV_texture_border_clamp | Not Supported
|
| | | GL_NV_texture_compression_latc | Not Supported
|
| | | GL_NV_texture_compression_s3tc | Not Supported
|
| | | GL_NV_texture_compression_s3tc_update | Not Supported
|
| | | GL_NV_texture_compression_vtc | Supported
|
| | | GL_NV_texture_env_combine4 | Supported
|
| | | GL_NV_texture_expand_normal | Not Supported
|
| | | GL_NV_texture_lod_clamp | Not Supported
|
| | | GL_NV_texture_multisample | Supported
|
| | | GL_NV_texture_npot_2D_mipmap | Not Supported
|
| | | GL_NV_texture_rectangle | Supported
|
| | | GL_NV_texture_shader | Supported
|
| | | GL_NV_texture_shader2 | Supported
|
| | | GL_NV_texture_shader3 | Supported
|
| | | GL_NV_timer_query | Not Supported
|
| | | GL_NV_transform_feedback | Supported
|
| | | GL_NV_transform_feedback2 | Supported
|
| | | GL_NV_uniform_buffer_unified_memory | Supported
|
| | | GL_NV_vdpau_interop | Not Supported
|
| | | GL_NV_vertex_array_range | Supported
|
| | | GL_NV_vertex_array_range2 | Supported
|
| | | GL_NV_vertex_attrib_64bit | Not Supported
|
| | | GL_NV_vertex_attrib_integer_64bit | Supported
|
| | | GL_NV_vertex_buffer_unified_memory | Supported
|
| | | GL_NV_vertex_program | Supported
|
| | | GL_NV_vertex_program1_1 | Supported
|
| | | GL_NV_vertex_program2 | Supported
|
| | | GL_NV_vertex_program2_option | Supported
|
| | | GL_NV_vertex_program3 | Supported
|
| | | GL_NV_vertex_program4 | Not Supported
|
| | | GL_NV_video_capture | Not Supported
|
| | | GL_NV_viewport_array2 | Not Supported
|
| | | GL_NVX_conditional_render | Supported
|
| | | GL_NVX_flush_hold | Not Supported
|
| | | GL_NVX_gpu_memory_info | Supported
|
| | | GL_NVX_instanced_arrays | Not Supported
|
| | | GL_NVX_nvenc_interop | Not Supported
|
| | | GL_NVX_shader_thread_group | Not Supported
|
| | | GL_NVX_shader_thread_shuffle | Not Supported
|
| | | GL_NVX_shared_sync_object | Not Supported
|
| | | GL_NVX_sysmem_buffer | Not Supported
|
| | | GL_NVX_ycrcb | Not Supported
|
| | | GL_OES_blend_equation_separate | Not Supported
|
| | | GL_OES_blend_func_separate | Not Supported
|
| | | GL_OES_blend_subtract | Not Supported
|
| | | GL_OES_byte_coordinates | Not Supported
|
| | | GL_OES_compressed_EAC_R11_signed_texture | Not Supported
|
| | | GL_OES_compressed_EAC_R11_unsigned_texture | Not Supported
|
| | | GL_OES_compressed_EAC_RG11_signed_texture | Not Supported
|
| | | GL_OES_compressed_EAC_RG11_unsigned_texture | Not Supported
|
| | | GL_OES_compressed_ETC1_RGB8_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_punchthroughA_RGBA8_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_punchthroughA_sRGB8_alpha_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_RGB8_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_RGBA8_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_sRGB8_alpha8_texture | Not Supported
|
| | | GL_OES_compressed_ETC2_sRGB8_texture | Not Supported
|
| | | GL_OES_compressed_paletted_texture | Not Supported
|
| | | GL_OES_conditional_query | Not Supported
|
| | | GL_OES_depth_texture | Not Supported
|
| | | GL_OES_depth_texture_cube_map | Not Supported
|
| | | GL_OES_depth24 | Not Supported
|
| | | GL_OES_depth32 | Not Supported
|
| | | GL_OES_draw_texture | Not Supported
|
| | | GL_OES_EGL_image | Not Supported
|
| | | GL_OES_EGL_image_external | Not Supported
|
| | | GL_OES_EGL_sync | Not Supported
|
| | | GL_OES_element_index_uint | Not Supported
|
| | | GL_OES_extended_matrix_palette | Not Supported
|
| | | GL_OES_fbo_render_mipmap | Not Supported
|
| | | GL_OES_fixed_point | Not Supported
|
| | | GL_OES_fragment_precision_high | Not Supported
|
| | | GL_OES_framebuffer_object | Not Supported
|
| | | GL_OES_get_program_binary | Not Supported
|
| | | GL_OES_mapbuffer | Not Supported
|
| | | GL_OES_matrix_get | Not Supported
|
| | | GL_OES_matrix_palette | Not Supported
|
| | | GL_OES_packed_depth_stencil | Not Supported
|
| | | GL_OES_point_size_array | Not Supported
|
| | | GL_OES_point_sprite | Not Supported
|
| | | GL_OES_query_matrix | Not Supported
|
| | | GL_OES_read_format | Not Supported
|
| | | GL_OES_required_internalformat | Not Supported
|
| | | GL_OES_rgb8_rgba8 | Not Supported
|
| | | GL_OES_sample_shading | Not Supported
|
| | | GL_OES_sample_variables | Not Supported
|
| | | GL_OES_shader_image_atomic | Not Supported
|
| | | GL_OES_shader_multisample_interpolation | Not Supported
|
| | | GL_OES_single_precision | Not Supported
|
| | | GL_OES_standard_derivatives | Not Supported
|
| | | GL_OES_stencil_wrap | Not Supported
|
| | | GL_OES_stencil1 | Not Supported
|
| | | GL_OES_stencil4 | Not Supported
|
| | | GL_OES_stencil8 | Not Supported
|
| | | GL_OES_surfaceless_context | Not Supported
|
| | | GL_OES_texture_3D | Not Supported
|
| | | GL_OES_texture_compression_astc | Not Supported
|
| | | GL_OES_texture_cube_map | Not Supported
|
| | | GL_OES_texture_env_crossbar | Not Supported
|
| | | GL_OES_texture_float | Not Supported
|
| | | GL_OES_texture_float_linear | Not Supported
|
| | | GL_OES_texture_half_float | Not Supported
|
| | | GL_OES_texture_half_float_linear | Not Supported
|
| | | GL_OES_texture_mirrored_repeat | Not Supported
|
| | | GL_OES_texture_npot | Not Supported
|
| | | GL_OES_texture_stencil8 | Not Supported
|
| | | GL_OES_texture_storage_multisample_2d_array | Not Supported
|
| | | GL_OES_vertex_array_object | Not Supported
|
| | | GL_OES_vertex_half_float | Not Supported
|
| | | GL_OES_vertex_type_10_10_10_2 | Not Supported
|
| | | GL_OML_interlace | Not Supported
|
| | | GL_OML_resample | Not Supported
|
| | | GL_OML_subsample | Not Supported
|
| | | GL_PGI_misc_hints | Not Supported
|
| | | GL_PGI_vertex_hints | Not Supported
|
| | | GL_QCOM_alpha_test | Not Supported
|
| | | GL_QCOM_binning_control | Not Supported
|
| | | GL_QCOM_driver_control | Not Supported
|
| | | GL_QCOM_extended_get | Not Supported
|
| | | GL_QCOM_extended_get2 | Not Supported
|
| | | GL_QCOM_perfmon_global_mode | Not Supported
|
| | | GL_QCOM_tiled_rendering | Not Supported
|
| | | GL_QCOM_writeonly_rendering | Not Supported
|
| | | GL_REND_screen_coordinates | Not Supported
|
| | | GL_S3_performance_analyzer | Not Supported
|
| | | GL_S3_s3tc | Supported
|
| | | GL_SGI_color_matrix | Not Supported
|
| | | GL_SGI_color_table | Not Supported
|
| | | GL_SGI_compiled_vertex_array | Not Supported
|
| | | GL_SGI_cull_vertex | Not Supported
|
| | | GL_SGI_index_array_formats | Not Supported
|
| | | GL_SGI_index_func | Not Supported
|
| | | GL_SGI_index_material | Not Supported
|
| | | GL_SGI_index_texture | Not Supported
|
| | | GL_SGI_make_current_read | Not Supported
|
| | | GL_SGI_texture_add_env | Not Supported
|
| | | GL_SGI_texture_color_table | Not Supported
|
| | | GL_SGI_texture_edge_clamp | Not Supported
|
| | | GL_SGI_texture_lod | Not Supported
|
| | | GL_SGIS_color_range | Not Supported
|
| | | GL_SGIS_detail_texture | Not Supported
|
| | | GL_SGIS_fog_function | Not Supported
|
| | | GL_SGIS_generate_mipmap | Supported
|
| | | GL_SGIS_multisample | Not Supported
|
| | | GL_SGIS_multitexture | Not Supported
|
| | | GL_SGIS_pixel_texture | Not Supported
|
| | | GL_SGIS_point_line_texgen | Not Supported
|
| | | GL_SGIS_sharpen_texture | Not Supported
|
| | | GL_SGIS_texture_border_clamp | Not Supported
|
| | | GL_SGIS_texture_color_mask | Not Supported
|
| | | GL_SGIS_texture_edge_clamp | Not Supported
|
| | | GL_SGIS_texture_filter4 | Not Supported
|
| | | GL_SGIS_texture_lod | Supported
|
| | | GL_SGIS_texture_select | Not Supported
|
| | | GL_SGIS_texture4D | Not Supported
|
| | | GL_SGIX_async | Not Supported
|
| | | GL_SGIX_async_histogram | Not Supported
|
| | | GL_SGIX_async_pixel | Not Supported
|
| | | GL_SGIX_blend_alpha_minmax | Not Supported
|
| | | GL_SGIX_clipmap | Not Supported
|
| | | GL_SGIX_convolution_accuracy | Not Supported
|
| | | GL_SGIX_depth_pass_instrument | Not Supported
|
| | | GL_SGIX_depth_texture | Supported
|
| | | GL_SGIX_flush_raster | Not Supported
|
| | | GL_SGIX_fog_offset | Not Supported
|
| | | GL_SGIX_fog_texture | Not Supported
|
| | | GL_SGIX_fragment_specular_lighting | Not Supported
|
| | | GL_SGIX_framezoom | Not Supported
|
| | | GL_SGIX_instruments | Not Supported
|
| | | GL_SGIX_interlace | Not Supported
|
| | | GL_SGIX_ir_instrument1 | Not Supported
|
| | | GL_SGIX_list_priority | Not Supported
|
| | | GL_SGIX_pbuffer | Not Supported
|
| | | GL_SGIX_pixel_texture | Not Supported
|
| | | GL_SGIX_pixel_texture_bits | Not Supported
|
| | | GL_SGIX_reference_plane | Not Supported
|
| | | GL_SGIX_resample | Not Supported
|
| | | GL_SGIX_shadow | Supported
|
| | | GL_SGIX_shadow_ambient | Not Supported
|
| | | GL_SGIX_sprite | Not Supported
|
| | | GL_SGIX_subsample | Not Supported
|
| | | GL_SGIX_tag_sample_buffer | Not Supported
|
| | | GL_SGIX_texture_add_env | Not Supported
|
| | | GL_SGIX_texture_coordinate_clamp | Not Supported
|
| | | GL_SGIX_texture_lod_bias | Not Supported
|
| | | GL_SGIX_texture_multi_buffer | Not Supported
|
| | | GL_SGIX_texture_range | Not Supported
|
| | | GL_SGIX_texture_scale_bias | Not Supported
|
| | | GL_SGIX_vertex_preclip | Not Supported
|
| | | GL_SGIX_vertex_preclip_hint | Not Supported
|
| | | GL_SGIX_ycrcb | Not Supported
|
| | | GL_SGIX_ycrcb_subsample | Not Supported
|
| | | GL_SUN_convolution_border_modes | Not Supported
|
| | | GL_SUN_global_alpha | Not Supported
|
| | | GL_SUN_mesh_array | Not Supported
|
| | | GL_SUN_multi_draw_arrays | Not Supported
|
| | | GL_SUN_read_video_pixels | Not Supported
|
| | | GL_SUN_slice_accum | Supported
|
| | | GL_SUN_triangle_list | Not Supported
|
| | | GL_SUN_vertex | Not Supported
|
| | | GL_SUNX_constant_data | Not Supported
|
| | | GL_VIV_shader_binary | Not Supported
|
| | | GL_WGL_ARB_extensions_string | Not Supported
|
| | | GL_WGL_EXT_extensions_string | Not Supported
|
| | | GL_WGL_EXT_swap_control | Not Supported
|
| | | GL_WIN_phong_shading | Not Supported
|
| | | GL_WIN_specular_fog | Not Supported
|
| | | GL_WIN_swap_hint | Supported
|
| | | GLU_EXT_nurbs_tessellator | Not Supported
|
| | | GLU_EXT_object_space_tess | Not Supported
|
| | | GLU_SGI_filter4_parameters | Not Supported
|
| | | GLX_AMD_gpu_association | Not Supported
|
| | | GLX_ARB_create_context | Not Supported
|
| | | GLX_ARB_create_context_profile | Not Supported
|
| | | GLX_ARB_create_context_robustness | Not Supported
|
| | | GLX_ARB_fbconfig_float | Not Supported
|
| | | GLX_ARB_framebuffer_sRGB | Not Supported
|
| | | GLX_ARB_get_proc_address | Not Supported
|
| | | GLX_ARB_multisample | Not Supported
|
| | | GLX_ARB_robustness_application_isolation | Not Supported
|
| | | GLX_ARB_robustness_share_group_isolation | Not Supported
|
| | | GLX_ARB_vertex_buffer_object | Not Supported
|
| | | GLX_EXT_buffer_age | Not Supported
|
| | | GLX_EXT_create_context_es_profile | Not Supported
|
| | | GLX_EXT_create_context_es2_profile | Not Supported
|
| | | GLX_EXT_fbconfig_packed_float | Not Supported
|
| | | GLX_EXT_framebuffer_sRGB | Not Supported
|
| | | GLX_EXT_import_context | Not Supported
|
| | | GLX_EXT_scene_marker | Not Supported
|
| | | GLX_EXT_swap_control | Not Supported
|
| | | GLX_EXT_swap_control_tear | Not Supported
|
| | | GLX_EXT_texture_from_pixmap | Not Supported
|
| | | GLX_EXT_visual_info | Not Supported
|
| | | GLX_EXT_visual_rating | Not Supported
|
| | | GLX_INTEL_swap_event | Not Supported
|
| | | GLX_MESA_agp_offset | Not Supported
|
| | | GLX_MESA_copy_sub_buffer | Not Supported
|
| | | GLX_MESA_multithread_makecurrent | Not Supported
|
| | | GLX_MESA_pixmap_colormap | Not Supported
|
| | | GLX_MESA_query_renderer | Not Supported
|
| | | GLX_MESA_release_buffers | Not Supported
|
| | | GLX_MESA_set_3dfx_mode | Not Supported
|
| | | GLX_MESA_swap_control | Not Supported
|
| | | GLX_NV_copy_image | Not Supported
|
| | | GLX_NV_delay_before_swap | Not Supported
|
| | | GLX_NV_float_buffer | Not Supported
|
| | | GLX_NV_multisample_coverage | Not Supported
|
| | | GLX_NV_present_video | Not Supported
|
| | | GLX_NV_swap_group | Not Supported
|
| | | GLX_NV_video_capture | Not Supported
|
| | | GLX_NV_video_out | Not Supported
|
| | | GLX_NV_video_output | Not Supported
|
| | | GLX_OML_interlace | Not Supported
|
| | | GLX_OML_swap_method | Not Supported
|
| | | GLX_OML_sync_control | Not Supported
|
| | | GLX_SGI_cushion | Not Supported
|
| | | GLX_SGI_make_current_read | Not Supported
|
| | | GLX_SGI_swap_control | Not Supported
|
| | | GLX_SGI_video_sync | Not Supported
|
| | | GLX_SGIS_blended_overlay | Not Supported
|
| | | GLX_SGIS_color_range | Not Supported
|
| | | GLX_SGIS_multisample | Not Supported
|
| | | GLX_SGIX_dm_buffer | Not Supported
|
| | | GLX_SGIX_fbconfig | Not Supported
|
| | | GLX_SGIX_hyperpipe | Not Supported
|
| | | GLX_SGIX_pbuffer | Not Supported
|
| | | GLX_SGIX_swap_barrier | Not Supported
|
| | | GLX_SGIX_swap_group | Not Supported
|
| | | GLX_SGIX_video_resize | Not Supported
|
| | | GLX_SGIX_video_source | Not Supported
|
| | | GLX_SGIX_visual_select_group | Not Supported
|
| | | GLX_SUN_get_transparent_index | Not Supported
|
| | | GLX_SUN_video_resize | Not Supported
|
| | | WGL_3DFX_gamma_control | Not Supported
|
| | | WGL_3DFX_multisample | Not Supported
|
| | | WGL_3DL_stereo_control | Not Supported
|
| | | WGL_AMD_gpu_association | Not Supported
|
| | | WGL_AMDX_gpu_association | Not Supported
|
| | | WGL_ARB_buffer_region | Supported
|
| | | WGL_ARB_context_flush_control | Supported
|
| | | WGL_ARB_create_context | Supported
|
| | | WGL_ARB_create_context_profile | Supported
|
| | | WGL_ARB_create_context_robustness | Supported
|
| | | WGL_ARB_extensions_string | Supported
|
| | | WGL_ARB_framebuffer_sRGB | Not Supported
|
| | | WGL_ARB_make_current_read | Supported
|
| | | WGL_ARB_multisample | Supported
|
| | | WGL_ARB_pbuffer | Supported
|
| | | WGL_ARB_pixel_format | Supported
|
| | | WGL_ARB_pixel_format_float | Supported
|
| | | WGL_ARB_render_texture | Supported
|
| | | WGL_ARB_robustness_application_isolation | Not Supported
|
| | | WGL_ARB_robustness_share_group_isolation | Not Supported
|
| | | WGL_ATI_pbuffer_memory_hint | Not Supported
|
| | | WGL_ATI_pixel_format_float | Supported
|
| | | WGL_ATI_render_texture_rectangle | Not Supported
|
| | | WGL_EXT_buffer_region | Not Supported
|
| | | WGL_EXT_create_context_es_profile | Supported
|
| | | WGL_EXT_create_context_es2_profile | Supported
|
| | | WGL_EXT_depth_float | Not Supported
|
| | | WGL_EXT_display_color_table | Not Supported
|
| | | WGL_EXT_extensions_string | Supported
|
| | | WGL_EXT_framebuffer_sRGB | Supported
|
| | | WGL_EXT_framebuffer_sRGBWGL_ARB_create_context | Not Supported
|
| | | WGL_EXT_gamma_control | Not Supported
|
| | | WGL_EXT_make_current_read | Not Supported
|
| | | WGL_EXT_multisample | Not Supported
|
| | | WGL_EXT_pbuffer | Not Supported
|
| | | WGL_EXT_pixel_format | Not Supported
|
| | | WGL_EXT_pixel_format_packed_float | Supported
|
| | | WGL_EXT_render_texture | Not Supported
|
| | | WGL_EXT_swap_control | Supported
|
| | | WGL_EXT_swap_control_tear | Supported
|
| | | WGL_EXT_swap_interval | Not Supported
|
| | | WGL_I3D_digital_video_control | Not Supported
|
| | | WGL_I3D_gamma | Not Supported
|
| | | WGL_I3D_genlock | Not Supported
|
| | | WGL_I3D_image_buffer | Not Supported
|
| | | WGL_I3D_swap_frame_lock | Not Supported
|
| | | WGL_I3D_swap_frame_usage | Not Supported
|
| | | WGL_MTX_video_preview | Not Supported
|
| | | WGL_NV_copy_image | Supported
|
| | | WGL_NV_delay_before_swap | Supported
|
| | | WGL_NV_DX_interop | Supported
|
| | | WGL_NV_DX_interop2 | Supported
|
| | | WGL_NV_float_buffer | Supported
|
| | | WGL_NV_gpu_affinity | Not Supported
|
| | | WGL_NV_multisample_coverage | Supported
|
| | | WGL_NV_present_video | Not Supported
|
| | | WGL_NV_render_depth_texture | Supported
|
| | | WGL_NV_render_texture_rectangle | Supported
|
| | | WGL_NV_swap_group | Not Supported
|
| | | WGL_NV_texture_rectangle | Not Supported
|
| | | WGL_NV_vertex_array_range | Not Supported
|
| | | WGL_NV_video_capture | Not Supported
|
| | | WGL_NV_video_output | Not Supported
|
| | | WGL_NVX_DX_interop | Supported
|
| | | WGL_OML_sync_control | Not Supported
|
| | | WGL_S3_cl_sharingWGL_ARB_create_context_profile | Not Supported
|
|
| | Supported Compressed Texture Formats:
|
| | | RGB DXT1 | Supported
|
| | | RGBA DXT1 | Not Supported
|
| | | RGBA DXT3 | Supported
|
| | | RGBA DXT5 | Supported
|
| | | RGB FXT1 | Not Supported
|
| | | RGBA FXT1 | Not Supported
|
| | | 3Dc | Not Supported
|
|
| | Video Adapter Manufacturer:
|
| | | Company Name | NVIDIA Corporation
|
| | | Product Information | http://www.nvidia.com/page/products.html
|
| | | Driver Download | http://www.nvidia.com/content/drivers/drivers.asp
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
| | | |
|
| [ Devices ]
|
|
| | Batteries:
|
| | | Microsoft AC Adapter | 6.1.7600.16385
|
| | | Microsoft ACPI-Compliant Control Method Battery | 6.1.7600.16385
|
| | | Microsoft Composite Battery | 6.1.7600.16385
|
|
| | Bluetooth Radios:
|
| | | Bluetooth Module | 8.0.1.340
|
|
| | Computer:
|
| | | ACPI x64-based PC | 6.1.7600.16385
|
|
| | Disk drives:
|
| | | INTEL SSDSC2BW120A4 | 6.1.7600.16385
|
| | | NORELSYS 106X USB Device | 6.1.7600.16385
|
|
| | Display adapters:
|
| | | NVIDIA GeForce GT 520M | 9.18.13.5286
|
|
| | DVD/CD-ROM drives:
|
| | | HL-DT-ST DVDRAM GT51N | 6.1.7601.17514
|
|
| | Human Interface Devices:
|
| | | USB Input Device | 6.1.7601.17514
|
|
| | IDE ATA/ATAPI controllers:
|
| | | Intel(R) Mobile Express Chipset SATA AHCI Controller | 11.1.0.1006
|
|
| | Imaging devices:
|
| | | ASUS USB2.0 WebCam | 6.1.7601.17514
|
|
| | Keyboards:
|
| | | Standard PS/2 Keyboard | 6.1.7601.17514
|
|
| | Mice and other pointing devices:
|
| | | HID-compliant mouse | 6.1.7600.16385
|
| | | Standard PS/2 Port Mouse | 6.1.7600.16385
|
|
| | Monitors:
|
| | | Generic PnP Monitor | 6.1.7600.16385
|
|
| | Network adapters:
|
| | | Atheros AR9002WB-1NG Wireless Network Adapter | 9.2.0.514
|
| | | Microsoft ISATAP Adapter #2 | 6.1.7600.16385
|
| | | Microsoft ISATAP Adapter | 6.1.7600.16385
|
| | | Realtek PCIe GBE Family Controller | 7.92.115.2015
|
| | | WAN Miniport (IKEv2) | 6.1.7601.17514
|
| | | WAN Miniport (IP) | 6.1.7601.17514
|
| | | WAN Miniport (IPv6) | 6.1.7601.17514
|
| | | WAN Miniport (L2TP) | 6.1.7601.17514
|
| | | WAN Miniport (Network Monitor) | 6.1.7601.17514
|
| | | WAN Miniport (PPPOE) | 6.1.7601.17514
|
| | | WAN Miniport (PPTP) | 6.1.7601.17514
|
| | | WAN Miniport (SSTP) | 6.1.7601.17514
|
|
| | Non-Plug and Play Drivers:
|
| | | Ancillary Function Driver for Winsock |
|
| | | Beep |
|
| | | Bitlocker Drive Encryption Filter Driver |
|
| | | CNG |
|
| | | Common Log (CLFS) |
|
| | | cpuz138 |
|
| | | Disk Virtual Machine Bus Acceleration Filter Driver |
|
| | | Dynamic Volume Manager |
|
| | | Hardware Policy Driver |
|
| | | HTTP |
|
| | | IDE Channel |
|
| | | Kernel Mode Driver Frameworks service |
|
| | | KSecDD |
|
| | | KSecPkg |
|
| | | LDDM Graphics Subsystem |
|
| | | Link-Layer Topology Discovery Mapper I/O Driver |
|
| | | Link-Layer Topology Discovery Responder |
|
| | | Mount Point Manager |
|
| | | msahci |
|
| | | msisadrv |
|
| | | NativeWiFi Filter |
|
| | | NDIS System Driver |
|
| | | NDIS Usermode I/O Protocol |
|
| | | NDProxy |
|
| | | NETBT |
|
| | | NetIO Legacy TDI Support Driver |
|
| | | NSI proxy service driver. |
|
| | | Null |
|
| | | Offline Files Driver |
|
| | | PEAUTH |
|
| | | Performance Counters for Windows Driver |
|
| | | QoS Packet Scheduler |
|
| | | RDP Encoder Mirror Driver |
|
| | | RDPCDD |
|
| | | Reflector Display Driver used to gain access to graphics data |
|
| | | Remote Access IPv6 ARP Driver |
|
| | | Security Driver |
|
| | | Security Processor Loader Driver |
|
| | | Storage volumes |
|
| | | System Attribute Cache |
|
| | | TCP/IP Protocol Driver |
|
| | | TCP/IP Registry Compatibility |
|
| | | User Mode Driver Frameworks Platform Driver |
|
| | | VgaSave |
|
| | | Virtual WiFi Filter Driver |
|
| | | WFP Lightweight Filter |
|
| | | Windows Firewall Authorization Driver |
|
|
| | Processors:
|
| | | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz | 6.1.7600.16385
|
|
| | Sound, video and game controllers:
|
| | | High Definition Audio Device | 6.1.7601.17514
|
| | | NVIDIA High Definition Audio | 1.3.34.3
|
|
| | Storage volume shadow copies:
|
| | | Generic volume shadow copy | 6.1.7600.16385
|
|
| | Storage Volumes:
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
| | | Generic volume | 6.1.7601.17514
|
|
| | System devices:
|
| | | 2nd Generation Intel(R) Core(TM) Processor Family DRAM Controller - 0104 | 9.2.0.1035
|
| | | ACPI Fixed Feature Button | 6.1.7601.17514
|
| | | ACPI Lid | 6.1.7601.17514
|
| | | ACPI Sleep Button | 6.1.7601.17514
|
| | | ACPI Thermal Zone | 6.1.7601.17514
|
| | | Composite Bus Enumerator | 6.1.7601.17514
|
| | | Direct memory access controller | 6.1.7601.17514
|
| | | File as Volume Driver | 6.1.7600.16385
|
| | | High Definition Audio Controller | 6.1.7601.17514
|
| | | High Definition Audio Controller | 6.1.7601.17514
|
| | | High precision event timer | 6.1.7601.17514
|
| | | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 1 - 1C10 | 9.2.0.1035
|
| | | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 2 - 1C12 | 9.2.0.1035
|
| | | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 4 - 1C16 | 9.2.0.1035
|
| | | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 6 - 1C1A | 9.2.0.1035
|
| | | Intel(R) 6 Series/C200 Series Chipset Family SMBus Controller - 1C22 | 9.2.0.1035
|
| | | Intel(R) 82802 Firmware Hub Device | 6.1.7601.17514
|
| | | Intel(R) HM65 Express Chipset Family LPC Interface Controller - 1C49 | 9.2.0.1035
|
| | | Intel(R) Management Engine Interface | 9.5.15.1730
|
| | | Microsoft ACPI-Compliant Embedded Controller | 6.1.7601.17514
|
| | | Microsoft ACPI-Compliant System | 6.1.7601.17514
|
| | | Microsoft System Management BIOS Driver | 6.1.7601.17514
|
| | | Microsoft Virtual Drive Enumerator Driver | 6.1.7601.17514
|
| | | Microsoft Windows Management Interface for ACPI | 6.1.7601.17514
|
| | | Motherboard resources | 6.1.7601.17514
|
| | | Motherboard resources | 6.1.7601.17514
|
| | | Motherboard resources | 6.1.7601.17514
|
| | | Motherboard resources | 6.1.7601.17514
|
| | | Motherboard resources | 6.1.7601.17514
|
| | | Numeric data processor | 6.1.7601.17514
|
| | | PCI bus | 3.0.1.41
|
| | | Plug and Play Software Device Enumerator | 6.1.7601.17514
|
| | | Programmable interrupt controller | 6.1.7601.17514
|
| | | Remote Desktop Device Redirector Bus | 6.1.7600.16385
|
| | | System CMOS/real time clock | 6.1.7601.17514
|
| | | System timer | 6.1.7601.17514
|
| | | Terminal Server Keyboard Driver | 6.1.7601.17514
|
| | | Terminal Server Mouse Driver | 6.1.7601.17514
|
| | | UMBus Enumerator | 6.1.7601.17514
|
| | | UMBus Root Bus Enumerator | 6.1.7601.17514
|
| | | Volume Manager | 6.1.7601.17514
|
| | | Xeon E3-1200/2nd Generation Intel(R) Core(TM) Processor Family PCI Express Root Port - 0101 | 9.2.0.1035
|
|
| | Universal Serial Bus controllers:
|
| | | ASMedia XHCI Controller | 1.16.22.0
|
| | | Generic USB Hub | 6.1.7601.17514
|
| | | Generic USB Hub | 6.1.7601.17514
|
| | | Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C26 | 9.2.0.1036
|
| | | Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C2D | 9.2.0.1036
|
| | | Realtek USB 2.0 Card Reader | 6.3.9600.39057
|
| | | USB Composite Device | 6.1.7601.17514
|
| | | USB Mass Storage Device | 6.1.7601.17514
|
| | | USB Root Hub | 6.1.7601.17514
|
| | | USB Root Hub | 6.1.7601.17514
|
| | | USB Root Hub | 1.16.22.0
|
|
| [ Batteries / Microsoft AC Adapter ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft AC Adapter
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | battery.inf
|
| | | INF Section | AcAdapter_Inst
|
| | | Hardware ID | ACPI\ACPI0003
|
| | | PnP Device | Microsoft AC Adapter
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Batteries / Microsoft ACPI-Compliant Control Method Battery ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft ACPI-Compliant Control Method Battery
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | battery.inf
|
| | | INF Section | CmBatt_Inst
|
| | | Hardware ID | ACPI\PNP0C0A
|
| | | PnP Device | Control Method Battery
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Batteries / Microsoft Composite Battery ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft Composite Battery
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | battery.inf
|
| | | INF Section | COMPBATT_Inst.NT
|
| | | Hardware ID | COMPOSITE_BATTERY
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Bluetooth Radios / Bluetooth Module ]
|
|
| | Device Properties:
|
| | | Driver Description | Bluetooth Module
|
| | | Driver Date | 1/29/2015
|
| | | Driver Version | 8.0.1.340
|
| | | Driver Provider | Qualcomm Atheros Communications
|
| | | INF File | oem16.inf
|
| | | INF Section | QCABTUSB
|
| | | Hardware ID | USB\VID_13D3&PID_3304&REV_0001
|
| | | Location Information | Port_#0001.Hub_#0003
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Computer / ACPI x64-based PC ]
|
|
| | Device Properties:
|
| | | Driver Description | ACPI x64-based PC
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | hal.inf
|
| | | INF Section | ACPI_AMD64_HAL
|
| | | Hardware ID | acpiapic
|
|
| [ Disk drives / INTEL SSDSC2BW120A4 ]
|
|
| | Device Properties:
|
| | | Driver Description | INTEL SSDSC2BW120A4
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | disk.inf
|
| | | INF Section | disk_install.NT
|
| | | Hardware ID | IDE\DiskINTEL_SSDSC2BW120A4_____________________DC32____
|
| | | Location Information | 0
|
|
| | Device Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/design/flash/nand/productinformation.htm
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Disk drives / NORELSYS 106X USB Device ]
|
|
| | Device Properties:
|
| | | Driver Description | NORELSYS 106X USB Device
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | disk.inf
|
| | | INF Section | disk_install.NT
|
| | | Hardware ID | USBSTOR\DiskNORELSYS106X____________ACD0
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Display adapters / NVIDIA GeForce GT 520M ]
|
|
| | Device Properties:
|
| | | Driver Description | NVIDIA GeForce GT 520M
|
| | | Driver Date | 5/11/2015
|
| | | Driver Version | 9.18.13.5286
|
| | | Driver Provider | NVIDIA
|
| | | INF File | oem4.inf
|
| | | INF Section | Section002
|
| | | Hardware ID | PCI\VEN_10DE&DEV_1050&SUBSYS_17421043&REV_A1
|
| | | Location Information | PCI bus 1, device 0, function 0
|
| | | PCI Device | nVIDIA GeForce GT 520M (Asus) Video Adapter
|
|
| | Device Resources:
|
| | | IRQ | 16
|
| | | Memory | 000A0000-000BFFFF
|
| | | Memory | C0000000-CFFFFFFF
|
| | | Memory | D0000000-D1FFFFFF
|
| | | Memory | DC000000-DCFFFFFF
|
| | | Port | 03B0-03BB
|
| | | Port | 03C0-03DF
|
| | | Port | D000-D07F
|
|
| | Video Adapter Manufacturer:
|
| | | Company Name | NVIDIA Corporation
|
| | | Product Information | http://www.nvidia.com/page/products.html
|
| | | Driver Download | http://www.nvidia.com/content/drivers/drivers.asp
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ DVD/CD-ROM drives / HL-DT-ST DVDRAM GT51N ]
|
|
| | Device Properties:
|
| | | Driver Description | HL-DT-ST DVDRAM GT51N
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | cdrom.inf
|
| | | INF Section | cdrom_install
|
| | | Hardware ID | IDE\CdRomHL-DT-ST_DVDRAM_GT51N___________________AS00____
|
| | | Location Information | 1
|
|
| | Device Manufacturer:
|
| | | Company Name | LG Electronics
|
| | | Product Information | http://www.lg.com/us/data-storage
|
| | | Firmware Download | http://www.lg.com/us/support
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Human Interface Devices / USB Input Device ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Input Device
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | input.inf
|
| | | INF Section | HID_Inst.NT
|
| | | Hardware ID | USB\VID_192F&PID_0416&REV_0200
|
| | | Location Information | Port_#0001.Hub_#0004
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ IDE ATA/ATAPI controllers / Intel(R) Mobile Express Chipset SATA AHCI Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Mobile Express Chipset SATA AHCI Controller
|
| | | Driver Date | 2/1/2012
|
| | | Driver Version | 11.1.0.1006
|
| | | Driver Provider | Intel
|
| | | INF File | oem10.inf
|
| | | INF Section | iaStor_Install
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C03&SUBSYS_12871043&REV_05
|
| | | Location Information | PCI bus 0, device 31, function 2
|
| | | PCI Device | Intel Cougar Point-M PCH - SATA AHCI 6-Port Controller [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 19
|
| | | Memory | DFA06000-DFA067FF
|
| | | Port | E020-E03F
|
| | | Port | E040-E043
|
| | | Port | E050-E057
|
| | | Port | E060-E063
|
| | | Port | E070-E077
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Imaging devices / ASUS USB2.0 WebCam ]
|
|
| | Device Properties:
|
| | | Driver Description | ASUS USB2.0 WebCam
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usbvideo.inf
|
| | | INF Section | USBVideo.NT
|
| | | Hardware ID | USB\VID_058F&PID_A014&REV_0003&MI_00
|
| | | Location Information | 0000.001a.0000.001.002.000.000.000.000
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Keyboards / Standard PS/2 Keyboard ]
|
|
| | Device Properties:
|
| | | Driver Description | Standard PS/2 Keyboard
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | keyboard.inf
|
| | | INF Section | STANDARD_Inst
|
| | | Hardware ID | ACPI\PNP0303
|
| | | PnP Device | 101/102-Key or MS Natural Keyboard
|
|
| | Device Resources:
|
| | | IRQ | 01
|
| | | Port | 0060-0060
|
| | | Port | 0064-0064
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Mice and other pointing devices / HID-compliant mouse ]
|
|
| | Device Properties:
|
| | | Driver Description | HID-compliant mouse
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | msmouse.inf
|
| | | INF Section | HID_Mouse_Inst.NT
|
| | | Hardware ID | HID\VID_192F&PID_0416&REV_0200
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Mice and other pointing devices / Standard PS/2 Port Mouse ]
|
|
| | Device Properties:
|
| | | Driver Description | Standard PS/2 Port Mouse
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | msmouse.inf
|
| | | INF Section | PS2_Inst
|
| | | Hardware ID | ACPI\ETD0101
|
| | | PnP Device | ELAN PS/2 Port Smart-Pad
|
|
| | Device Resources:
|
| | | IRQ | 12
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Monitors / Generic PnP Monitor ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic PnP Monitor
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | monitor.inf
|
| | | INF Section | PnPMonitor.Install
|
| | | Hardware ID | MONITOR\CMI001B
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / Atheros AR9002WB-1NG Wireless Network Adapter ]
|
|
| | Device Properties:
|
| | | Driver Description | Atheros AR9002WB-1NG Wireless Network Adapter
|
| | | Driver Date | 11/26/2012
|
| | | Driver Version | 9.2.0.514
|
| | | Driver Provider | Atheros Communications Inc.
|
| | | INF File | oem9.inf
|
| | | INF Section | ATHR_DEV_OS61_30AB2C37.ndi.NTAMD64
|
| | | Hardware ID | PCI\VEN_168C&DEV_002B&SUBSYS_2C371A3B&REV_01
|
| | | Location Information | PCI bus 3, device 0, function 0
|
| | | PCI Device | Atheros AR9285 802.11b/g/n Wireless Network Adapter
|
|
| | Device Resources:
|
| | | IRQ | 17
|
| | | Memory | DEFF0000-DEFFFFFF
|
|
| | Network Adapter Manufacturer:
|
| | | Company Name | Atheros Communications, Inc.
|
| | | Product Information | http://www.atheros.com/networking
|
| | | Driver Download | http://www.atheros.com
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / Microsoft ISATAP Adapter #2 ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft ISATAP Adapter #2
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Hardware ID | *ISATAP
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / Microsoft ISATAP Adapter ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft ISATAP Adapter
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Hardware ID | *ISATAP
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / Realtek PCIe GBE Family Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | Realtek PCIe GBE Family Controller
|
| | | Driver Date | 1/15/2015
|
| | | Driver Version | 7.92.115.2015
|
| | | Driver Provider | Realtek
|
| | | INF File | oem7.inf
|
| | | INF Section | RTL8168E.ndi.NT
|
| | | Hardware ID | PCI\VEN_10EC&DEV_8168&SUBSYS_12871043&REV_06
|
| | | Location Information | PCI bus 5, device 0, function 0
|
| | | PCI Device | Realtek RTL8168/8111 PCI-E Gigabit Ethernet Adapter
|
|
| | Device Resources:
|
| | | IRQ | 65536
|
| | | Memory | D2100000-D2103FFF
|
| | | Memory | D2104000-D2104FFF
|
| | | Port | 9000-90FF
|
|
| | Network Adapter Manufacturer:
|
| | | Company Name | Realtek Semiconductor Corp.
|
| | | Product Information | http://www.realtek.com.tw/products/productsView.aspx?Langid=1&PNid=7&PFid=10&Level=3&Conn=2
|
| | | Driver Download | http://www.realtek.com.tw/downloads
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (IKEv2) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (IKEv2)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netavpna.inf
|
| | | INF Section | Ndi-Mp-AgileVpn
|
| | | Hardware ID | ms_agilevpnminiport
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (IP) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (IP)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-Ip
|
| | | Hardware ID | ms_ndiswanip
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (IPv6) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (IPv6)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-Ipv6
|
| | | Hardware ID | ms_ndiswanipv6
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (L2TP) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (L2TP)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-L2tp
|
| | | Hardware ID | ms_l2tpminiport
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (Network Monitor) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (Network Monitor)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-Bh
|
| | | Hardware ID | ms_ndiswanbh
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (PPPOE) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (PPPOE)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-Pppoe
|
| | | Hardware ID | ms_pppoeminiport
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (PPTP) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (PPTP)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netrasa.inf
|
| | | INF Section | Ndi-Mp-Pptp
|
| | | Hardware ID | ms_pptpminiport
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Network adapters / WAN Miniport (SSTP) ]
|
|
| | Device Properties:
|
| | | Driver Description | WAN Miniport (SSTP)
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | netsstpa.inf
|
| | | INF Section | Ndi-Mp-Sstp
|
| | | Hardware ID | ms_sstpminiport
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Non-Plug and Play Drivers / Ancillary Function Driver for Winsock ]
|
|
| | Device Properties:
|
| | | Driver Description | Ancillary Function Driver for Winsock
|
|
| [ Non-Plug and Play Drivers / Beep ]
|
|
| | Device Properties:
|
| | | Driver Description | Beep
|
|
| [ Non-Plug and Play Drivers / Bitlocker Drive Encryption Filter Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Bitlocker Drive Encryption Filter Driver
|
|
| [ Non-Plug and Play Drivers / CNG ]
|
|
| | Device Properties:
|
| | | Driver Description | CNG
|
|
| [ Non-Plug and Play Drivers / Common Log (CLFS) ]
|
|
| | Device Properties:
|
| | | Driver Description | Common Log (CLFS)
|
|
| [ Non-Plug and Play Drivers / cpuz138 ]
|
|
| | Device Properties:
|
| | | Driver Description | cpuz138
|
|
| [ Non-Plug and Play Drivers / Disk Virtual Machine Bus Acceleration Filter Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Disk Virtual Machine Bus Acceleration Filter Driver
|
|
| [ Non-Plug and Play Drivers / Dynamic Volume Manager ]
|
|
| | Device Properties:
|
| | | Driver Description | Dynamic Volume Manager
|
|
| [ Non-Plug and Play Drivers / Hardware Policy Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Hardware Policy Driver
|
|
| [ Non-Plug and Play Drivers / HTTP ]
|
|
| | Device Properties:
|
| | | Driver Description | HTTP
|
|
| [ Non-Plug and Play Drivers / IDE Channel ]
|
|
| | Device Properties:
|
| | | Driver Description | IDE Channel
|
|
| [ Non-Plug and Play Drivers / Kernel Mode Driver Frameworks service ]
|
|
| | Device Properties:
|
| | | Driver Description | Kernel Mode Driver Frameworks service
|
|
| [ Non-Plug and Play Drivers / KSecDD ]
|
|
| | Device Properties:
|
| | | Driver Description | KSecDD
|
|
| [ Non-Plug and Play Drivers / KSecPkg ]
|
|
| | Device Properties:
|
| | | Driver Description | KSecPkg
|
|
| [ Non-Plug and Play Drivers / LDDM Graphics Subsystem ]
|
|
| | Device Properties:
|
| | | Driver Description | LDDM Graphics Subsystem
|
|
| [ Non-Plug and Play Drivers / Link-Layer Topology Discovery Mapper I/O Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Link-Layer Topology Discovery Mapper I/O Driver
|
|
| [ Non-Plug and Play Drivers / Link-Layer Topology Discovery Responder ]
|
|
| | Device Properties:
|
| | | Driver Description | Link-Layer Topology Discovery Responder
|
|
| [ Non-Plug and Play Drivers / Mount Point Manager ]
|
|
| | Device Properties:
|
| | | Driver Description | Mount Point Manager
|
|
| [ Non-Plug and Play Drivers / msahci ]
|
|
| | Device Properties:
|
| | | Driver Description | msahci
|
|
| [ Non-Plug and Play Drivers / msisadrv ]
|
|
| | Device Properties:
|
| | | Driver Description | msisadrv
|
|
| [ Non-Plug and Play Drivers / NativeWiFi Filter ]
|
|
| | Device Properties:
|
| | | Driver Description | NativeWiFi Filter
|
|
| [ Non-Plug and Play Drivers / NDIS System Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | NDIS System Driver
|
|
| [ Non-Plug and Play Drivers / NDIS Usermode I/O Protocol ]
|
|
| | Device Properties:
|
| | | Driver Description | NDIS Usermode I/O Protocol
|
|
| [ Non-Plug and Play Drivers / NDProxy ]
|
|
| | Device Properties:
|
| | | Driver Description | NDProxy
|
|
| [ Non-Plug and Play Drivers / NETBT ]
|
|
| | Device Properties:
|
| | | Driver Description | NETBT
|
|
| [ Non-Plug and Play Drivers / NetIO Legacy TDI Support Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | NetIO Legacy TDI Support Driver
|
|
| [ Non-Plug and Play Drivers / NSI proxy service driver. ]
|
|
| | Device Properties:
|
| | | Driver Description | NSI proxy service driver.
|
|
| [ Non-Plug and Play Drivers / Null ]
|
|
| | Device Properties:
|
| | | Driver Description | Null
|
|
| [ Non-Plug and Play Drivers / Offline Files Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Offline Files Driver
|
|
| [ Non-Plug and Play Drivers / PEAUTH ]
|
|
| | Device Properties:
|
| | | Driver Description | PEAUTH
|
|
| [ Non-Plug and Play Drivers / Performance Counters for Windows Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Performance Counters for Windows Driver
|
|
| [ Non-Plug and Play Drivers / QoS Packet Scheduler ]
|
|
| | Device Properties:
|
| | | Driver Description | QoS Packet Scheduler
|
|
| [ Non-Plug and Play Drivers / RDP Encoder Mirror Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | RDP Encoder Mirror Driver
|
|
| [ Non-Plug and Play Drivers / RDPCDD ]
|
|
| | Device Properties:
|
| | | Driver Description | RDPCDD
|
|
| [ Non-Plug and Play Drivers / Reflector Display Driver used to gain access to graphics data ]
|
|
| | Device Properties:
|
| | | Driver Description | Reflector Display Driver used to gain access to graphics data
|
|
| [ Non-Plug and Play Drivers / Remote Access IPv6 ARP Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Remote Access IPv6 ARP Driver
|
|
| [ Non-Plug and Play Drivers / Security Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Security Driver
|
|
| [ Non-Plug and Play Drivers / Security Processor Loader Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Security Processor Loader Driver
|
|
| [ Non-Plug and Play Drivers / Storage volumes ]
|
|
| | Device Properties:
|
| | | Driver Description | Storage volumes
|
|
| [ Non-Plug and Play Drivers / System Attribute Cache ]
|
|
| | Device Properties:
|
| | | Driver Description | System Attribute Cache
|
|
| [ Non-Plug and Play Drivers / TCP/IP Protocol Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | TCP/IP Protocol Driver
|
|
| [ Non-Plug and Play Drivers / TCP/IP Registry Compatibility ]
|
|
| | Device Properties:
|
| | | Driver Description | TCP/IP Registry Compatibility
|
|
| [ Non-Plug and Play Drivers / User Mode Driver Frameworks Platform Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | User Mode Driver Frameworks Platform Driver
|
|
| [ Non-Plug and Play Drivers / VgaSave ]
|
|
| | Device Properties:
|
| | | Driver Description | VgaSave
|
|
| [ Non-Plug and Play Drivers / Virtual WiFi Filter Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Virtual WiFi Filter Driver
|
|
| [ Non-Plug and Play Drivers / WFP Lightweight Filter ]
|
|
| | Device Properties:
|
| | | Driver Description | WFP Lightweight Filter
|
|
| [ Non-Plug and Play Drivers / Windows Firewall Authorization Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Windows Firewall Authorization Driver
|
|
| [ Processors / Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Hardware ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_42
|
|
| | CPU Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-2450M
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Processors / Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Hardware ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_42
|
|
| | CPU Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-2450M
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Processors / Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Hardware ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_42
|
|
| | CPU Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-2450M
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Processors / Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Hardware ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_42
|
|
| | CPU Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-2450M
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Sound, video and game controllers / High Definition Audio Device ]
|
|
| | Device Properties:
|
| | | Driver Description | High Definition Audio Device
|
| | | Driver Date | 11/19/2010
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | hdaudio.inf
|
| | | INF Section | HdAudModel
|
| | | Hardware ID | HDAUDIO\FUNC_01&VEN_10EC&DEV_0269&SUBSYS_10431AD3&REV_1001
|
| | | Location Information | Internal High Definition Audio Bus
|
|
| | Device Manufacturer:
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Sound, video and game controllers / NVIDIA High Definition Audio ]
|
|
| | Device Properties:
|
| | | Driver Description | NVIDIA High Definition Audio
|
| | | Driver Date | 4/16/2015
|
| | | Driver Version | 1.3.34.3
|
| | | Driver Provider | NVIDIA Corporation
|
| | | INF File | oem2.inf
|
| | | INF Section | NVHDA64V
|
| | | Hardware ID | HDAUDIO\FUNC_01&VEN_10DE&DEV_001C&SUBSYS_00000000&REV_1001
|
| | | Location Information | Internal High Definition Audio Bus
|
|
| | Device Manufacturer:
|
| | | Company Name | NVIDIA Corporation
|
| | | Product Information | http://www.nvidia.com/page/mobo.html
|
| | | Driver Download | http://www.nvidia.com/content/drivers/drivers.asp
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Storage volume shadow copies / Generic volume shadow copy ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume shadow copy
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | volsnap.inf
|
| | | INF Section | volume_snapshot_install.NTAMD64
|
| | | Hardware ID | STORAGE\VolumeSnapshot
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ Storage Volumes / Generic volume ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic volume
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Hardware ID | STORAGE\Volume
|
|
| [ System devices / 2nd Generation Intel(R) Core(TM) Processor Family DRAM Controller - 0104 ]
|
|
| | Device Properties:
|
| | | Driver Description | 2nd Generation Intel(R) Core(TM) Processor Family DRAM Controller - 0104
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem8.inf
|
| | | INF Section | Intel_NO_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_0104&SUBSYS_12871043&REV_09
|
| | | Location Information | PCI bus 0, device 0, function 0
|
| | | PCI Device | Intel Sandy Bridge-MB - Host Bridge/DRAM Controller
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / ACPI Fixed Feature Button ]
|
|
| | Device Properties:
|
| | | Driver Description | ACPI Fixed Feature Button
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Hardware ID | ACPI\FixedButton
|
|
| [ System devices / ACPI Lid ]
|
|
| | Device Properties:
|
| | | Driver Description | ACPI Lid
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Hardware ID | ACPI\PNP0C0D
|
| | | PnP Device | Lid
|
|
| [ System devices / ACPI Sleep Button ]
|
|
| | Device Properties:
|
| | | Driver Description | ACPI Sleep Button
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Hardware ID | ACPI\PNP0C0E
|
| | | PnP Device | Sleep Button
|
|
| [ System devices / ACPI Thermal Zone ]
|
|
| | Device Properties:
|
| | | Driver Description | ACPI Thermal Zone
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Hardware ID | ACPI\ThermalZone
|
|
| [ System devices / Composite Bus Enumerator ]
|
|
| | Device Properties:
|
| | | Driver Description | Composite Bus Enumerator
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | compositebus.inf
|
| | | INF Section | CompositeBus_Device.NT
|
| | | Hardware ID | ROOT\CompositeBus
|
|
| [ System devices / Direct memory access controller ]
|
|
| | Device Properties:
|
| | | Driver Description | Direct memory access controller
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Hardware ID | ACPI\PNP0200
|
| | | PnP Device | DMA Controller
|
|
| | Device Resources:
|
| | | DMA | 04
|
| | | Port | 0000-001F
|
| | | Port | 0081-0091
|
| | | Port | 0093-009F
|
| | | Port | 00C0-00DF
|
|
| [ System devices / File as Volume Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | File as Volume Driver
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | blbdrive.inf
|
| | | INF Section | blbdrive_device.NT
|
| | | Hardware ID | ROOT\BLBDRIVE
|
|
| [ System devices / High Definition Audio Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | High Definition Audio Controller
|
| | | Driver Date | 11/19/2010
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | hdaudbus.inf
|
| | | INF Section | HDAudio_Device.NT
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C20&SUBSYS_1AD31043&REV_05
|
| | | Location Information | PCI bus 0, device 27, function 0
|
| | | PCI Device | Intel Cougar Point PCH - High Definition Audio Controller [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 22
|
| | | Memory | DFA00000-DFA03FFF
|
|
| [ System devices / High Definition Audio Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | High Definition Audio Controller
|
| | | Driver Date | 11/19/2010
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | hdaudbus.inf
|
| | | INF Section | HDAudio_Device.NT
|
| | | Hardware ID | PCI\VEN_10DE&DEV_0E08&SUBSYS_00000000&REV_A1
|
| | | Location Information | PCI bus 1, device 0, function 1
|
| | | PCI Device | nVIDIA GF119 - High Definition Audio Controller
|
|
| | Device Resources:
|
| | | IRQ | 17
|
| | | Memory | DD080000-DD083FFF
|
|
| [ System devices / High precision event timer ]
|
|
| | Device Properties:
|
| | | Driver Description | High precision event timer
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_HPET
|
| | | Hardware ID | ACPI\PNP0103
|
| | | PnP Device | High Precision Event Timer
|
|
| | Device Resources:
|
| | | Memory | FED00000-FED003FF
|
|
| [ System devices / Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 1 - 1C10 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 1 - 1C10
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem11.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C10&SUBSYS_12871043&REV_B5
|
| | | Location Information | PCI bus 0, device 28, function 0
|
| | | PCI Device | Intel Cougar Point PCH - PCI Express Port 1 [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 16
|
| | | Memory | D4200000-D4BFFFFF
|
| | | Memory | DF000000-DF9FFFFF
|
| | | Port | C000-CFFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 2 - 1C12 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 2 - 1C12
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem11.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C12&SUBSYS_12871043&REV_B5
|
| | | Location Information | PCI bus 0, device 28, function 1
|
| | | PCI Device | Intel Cougar Point PCH - PCI Express Port 2 [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 17
|
| | | Memory | D3700000-D40FFFFF
|
| | | Memory | DE600000-DEFFFFFF
|
| | | Port | B000-BFFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 4 - 1C16 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 4 - 1C16
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem11.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C16&SUBSYS_12871043&REV_B5
|
| | | Location Information | PCI bus 0, device 28, function 3
|
| | | PCI Device | Intel Cougar Point PCH - PCI Express Port 4 [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 19
|
| | | Memory | D2C00000-D35FFFFF
|
| | | Memory | DDC00000-DE5FFFFF
|
| | | Port | A000-AFFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 6 - 1C1A ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family PCI Express Root Port 6 - 1C1A
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem11.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C1A&SUBSYS_12871043&REV_B5
|
| | | Location Information | PCI bus 0, device 28, function 5
|
| | | PCI Device | Intel Cougar Point PCH - PCI Express Port 6 [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 17
|
| | | Memory | D2100000-D2AFFFFF
|
| | | Memory | DD200000-DDBFFFFF
|
| | | Port | 9000-9FFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) 6 Series/C200 Series Chipset Family SMBus Controller - 1C22 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family SMBus Controller - 1C22
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem12.inf
|
| | | INF Section | Intel_NO_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C22&SUBSYS_12871043&REV_05
|
| | | Location Information | PCI bus 0, device 31, function 3
|
| | | PCI Device | Intel Cougar Point PCH - SMBus Controller [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 11
|
| | | Memory | DFA05000-DFA050FF
|
| | | Port | E000-E01F
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) 82802 Firmware Hub Device ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 82802 Firmware Hub Device
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MEM
|
| | | Hardware ID | ACPI\INT0800
|
| | | PnP Device | Intel Flash EEPROM
|
|
| | Device Resources:
|
| | | Memory | FF000000-FFFFFFFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) HM65 Express Chipset Family LPC Interface Controller - 1C49 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) HM65 Express Chipset Family LPC Interface Controller - 1C49
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem11.inf
|
| | | INF Section | Intel_ISAPNP_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C49&SUBSYS_12871043&REV_05
|
| | | Location Information | PCI bus 0, device 31, function 0
|
| | | PCI Device | Intel HM65 PCH - LPC Interface Controller [B-3]
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Intel(R) Management Engine Interface ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) Management Engine Interface
|
| | | Driver Date | 9/5/2013
|
| | | Driver Version | 9.5.15.1730
|
| | | Driver Provider | Intel
|
| | | INF File | oem14.inf
|
| | | INF Section | TEE_DDI_x64
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C3A&SUBSYS_12871043&REV_04
|
| | | Location Information | PCI bus 0, device 22, function 0
|
| | | PCI Device | Intel Cougar Point PCH - Manageability Engine Interface 1 [B-2]
|
|
| | Device Resources:
|
| | | IRQ | 65536
|
| | | Memory | DFA0A000-DFA0A00F
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ System devices / Microsoft ACPI-Compliant Embedded Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft ACPI-Compliant Embedded Controller
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Hardware ID | ACPI\PNP0C09
|
| | | PnP Device | Embedded Controller Device
|
|
| | Device Resources:
|
| | | Port | 0062-0062
|
| | | Port | 0066-0066
|
|
| [ System devices / Microsoft ACPI-Compliant System ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft ACPI-Compliant System
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | acpi.inf
|
| | | INF Section | ACPI_Inst.NT
|
| | | Hardware ID | ACPI_HAL\PNP0C08
|
| | | PnP Device | ACPI Driver/BIOS
|
|
| | Device Resources:
|
| | | IRQ | 100
|
| | | IRQ | 101
|
| | | IRQ | 102
|
| | | IRQ | 103
|
| | | IRQ | 104
|
| | | IRQ | 105
|
| | | IRQ | 106
|
| | | IRQ | 107
|
| | | IRQ | 108
|
| | | IRQ | 109
|
| | | IRQ | 110
|
| | | IRQ | 111
|
| | | IRQ | 112
|
| | | IRQ | 113
|
| | | IRQ | 114
|
| | | IRQ | 115
|
| | | IRQ | 116
|
| | | IRQ | 117
|
| | | IRQ | 118
|
| | | IRQ | 119
|
| | | IRQ | 120
|
| | | IRQ | 121
|
| | | IRQ | 122
|
| | | IRQ | 123
|
| | | IRQ | 124
|
| | | IRQ | 125
|
| | | IRQ | 126
|
| | | IRQ | 127
|
| | | IRQ | 128
|
| | | IRQ | 129
|
| | | IRQ | 130
|
| | | IRQ | 131
|
| | | IRQ | 132
|
| | | IRQ | 133
|
| | | IRQ | 134
|
| | | IRQ | 135
|
| | | IRQ | 136
|
| | | IRQ | 137
|
| | | IRQ | 138
|
| | | IRQ | 139
|
| | | IRQ | 140
|
| | | IRQ | 141
|
| | | IRQ | 142
|
| | | IRQ | 143
|
| | | IRQ | 144
|
| | | IRQ | 145
|
| | | IRQ | 146
|
| | | IRQ | 147
|
| | | IRQ | 148
|
| | | IRQ | 149
|
| | | IRQ | 150
|
| | | IRQ | 151
|
| | | IRQ | 152
|
| | | IRQ | 153
|
| | | IRQ | 154
|
| | | IRQ | 155
|
| | | IRQ | 156
|
| | | IRQ | 157
|
| | | IRQ | 158
|
| | | IRQ | 159
|
| | | IRQ | 160
|
| | | IRQ | 161
|
| | | IRQ | 162
|
| | | IRQ | 163
|
| | | IRQ | 164
|
| | | IRQ | 165
|
| | | IRQ | 166
|
| | | IRQ | 167
|
| | | IRQ | 168
|
| | | IRQ | 169
|
| | | IRQ | 170
|
| | | IRQ | 171
|
| | | IRQ | 172
|
| | | IRQ | 173
|
| | | IRQ | 174
|
| | | IRQ | 175
|
| | | IRQ | 176
|
| | | IRQ | 177
|
| | | IRQ | 178
|
| | | IRQ | 179
|
| | | IRQ | 180
|
| | | IRQ | 181
|
| | | IRQ | 182
|
| | | IRQ | 183
|
| | | IRQ | 184
|
| | | IRQ | 185
|
| | | IRQ | 186
|
| | | IRQ | 187
|
| | | IRQ | 188
|
| | | IRQ | 189
|
| | | IRQ | 190
|
| | | IRQ | 81
|
| | | IRQ | 82
|
| | | IRQ | 83
|
| | | IRQ | 84
|
| | | IRQ | 85
|
| | | IRQ | 86
|
| | | IRQ | 87
|
| | | IRQ | 88
|
| | | IRQ | 89
|
| | | IRQ | 90
|
| | | IRQ | 91
|
| | | IRQ | 92
|
| | | IRQ | 93
|
| | | IRQ | 94
|
| | | IRQ | 95
|
| | | IRQ | 96
|
| | | IRQ | 97
|
| | | IRQ | 98
|
| | | IRQ | 99
|
|
| [ System devices / Microsoft System Management BIOS Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft System Management BIOS Driver
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | MSSMBIOS_DRV
|
| | | Hardware ID | ROOT\mssmbios
|
|
| [ System devices / Microsoft Virtual Drive Enumerator Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft Virtual Drive Enumerator Driver
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | VDRVROOT
|
| | | Hardware ID | ROOT\vdrvroot
|
|
| [ System devices / Microsoft Windows Management Interface for ACPI ]
|
|
| | Device Properties:
|
| | | Driver Description | Microsoft Windows Management Interface for ACPI
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | acpi.inf
|
| | | INF Section | WMIMAP_Inst.NT
|
| | | Hardware ID | ACPI\pnp0c14
|
| | | PnP Device | ACPI Management Interface
|
|
| [ System devices / Motherboard resources ]
|
|
| | Device Properties:
|
| | | Driver Description | Motherboard resources
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Hardware ID | ACPI\INT340E
|
| | | PnP Device | Intel System Device
|
|
| [ System devices / Motherboard resources ]
|
|
| | Device Properties:
|
| | | Driver Description | Motherboard resources
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Hardware ID | ACPI\PNP0C02
|
| | | PnP Device | Thermal Monitoring ACPI Device
|
|
| | Device Resources:
|
| | | Memory | D4C00000-D4C00FFF
|
| | | Memory | E0000000-E3FFFFFF
|
| | | Memory | FED10000-FED17FFF
|
| | | Memory | FED18000-FED18FFF
|
| | | Memory | FED19000-FED19FFF
|
| | | Memory | FED1C000-FED1FFFF
|
| | | Memory | FED20000-FED3FFFF
|
| | | Memory | FED45000-FED8FFFF
|
| | | Memory | FED90000-FED93FFF
|
| | | Memory | FEE00000-FEEFFFFF
|
| | | Memory | FF000000-FFFFFFFF
|
|
| [ System devices / Motherboard resources ]
|
|
| | Device Properties:
|
| | | Driver Description | Motherboard resources
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Hardware ID | ACPI\PNP0C02
|
| | | PnP Device | Thermal Monitoring ACPI Device
|
|
| | Device Resources:
|
| | | Memory | D4C00000-D4C00FFF
|
|
| [ System devices / Motherboard resources ]
|
|
| | Device Properties:
|
| | | Driver Description | Motherboard resources
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Hardware ID | ACPI\INT3F0D
|
| | | PnP Device | Intel Watchdog Timer
|
|
| | Device Resources:
|
| | | Port | 0454-0457
|
|
| [ System devices / Motherboard resources ]
|
|
| | Device Properties:
|
| | | Driver Description | Motherboard resources
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Hardware ID | ACPI\PNP0C02
|
| | | PnP Device | Thermal Monitoring ACPI Device
|
|
| | Device Resources:
|
| | | Port | 002E-002F
|
| | | Port | 004E-004F
|
| | | Port | 0061-0061
|
| | | Port | 0063-0063
|
| | | Port | 0065-0065
|
| | | Port | 0067-0067
|
| | | Port | 0070-0070
|
| | | Port | 0080-0080
|
| | | Port | 0092-0092
|
| | | Port | 00B2-00B3
|
| | | Port | 0400-0453
|
| | | Port | 0458-047F
|
| | | Port | 0500-057F
|
| | | Port | 0680-069F
|
| | | Port | 1000-100F
|
| | | Port | 164E-164F
|
| | | Port | FFFF-FFFF
|
| | | Port | FFFF-FFFF
|
|
| [ System devices / Numeric data processor ]
|
|
| | Device Properties:
|
| | | Driver Description | Numeric data processor
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Hardware ID | ACPI\PNP0C04
|
| | | PnP Device | Numeric Data Processor
|
|
| | Device Resources:
|
| | | IRQ | 13
|
| | | Port | 00F0-00F0
|
|
| [ System devices / PCI bus ]
|
|
| | Device Properties:
|
| | | Driver Description | PCI bus
|
| | | Driver Date | 8/8/2014
|
| | | Driver Version | 3.0.1.41
|
| | | Driver Provider | Intel
|
| | | INF File | oem3.inf
|
| | | INF Section | HCSwitch.NT
|
| | | Hardware ID | ACPI\PNP0A08
|
| | | PnP Device | ACPI Three-wire Device Bus
|
|
| | Device Resources:
|
| | | Memory | 000A0000-000BFFFF
|
| | | Memory | 000D0000-000D3FFF
|
| | | Memory | 000D4000-000D7FFF
|
| | | Memory | 000D8000-000DBFFF
|
| | | Memory | 000DC000-000DFFFF
|
| | | Memory | 000E0000-000E3FFF
|
| | | Memory | 000E4000-000E7FFF
|
| | | Memory | C0000000-FEAFFFFF
|
| | | Memory | FED40000-FED44FFF
|
| | | Port | 0000-0CF7
|
| | | Port | 0D00-FFFF
|
|
| [ System devices / Plug and Play Software Device Enumerator ]
|
|
| | Device Properties:
|
| | | Driver Description | Plug and Play Software Device Enumerator
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | SWENUM
|
| | | Hardware ID | root\swenum
|
|
| [ System devices / Programmable interrupt controller ]
|
|
| | Device Properties:
|
| | | Driver Description | Programmable interrupt controller
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_PIC
|
| | | Hardware ID | ACPI\PNP0000
|
| | | PnP Device | Programmable Interrupt Controller
|
|
| | Device Resources:
|
| | | Port | 0020-0021
|
| | | Port | 0024-0025
|
| | | Port | 0028-0029
|
| | | Port | 002C-002D
|
| | | Port | 0030-0031
|
| | | Port | 0034-0035
|
| | | Port | 0038-0039
|
| | | Port | 003C-003D
|
| | | Port | 00A0-00A1
|
| | | Port | 00A4-00A5
|
| | | Port | 00A8-00A9
|
| | | Port | 00AC-00AD
|
| | | Port | 00B0-00B1
|
| | | Port | 00B4-00B5
|
| | | Port | 00B8-00B9
|
| | | Port | 00BC-00BD
|
| | | Port | 04D0-04D1
|
|
| [ System devices / Remote Desktop Device Redirector Bus ]
|
|
| | Device Properties:
|
| | | Driver Description | Remote Desktop Device Redirector Bus
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7600.16385
|
| | | Driver Provider | Microsoft
|
| | | INF File | rdpbus.inf
|
| | | INF Section | RDPBUS
|
| | | Hardware ID | ROOT\RDPBUS
|
|
| [ System devices / System CMOS/real time clock ]
|
|
| | Device Properties:
|
| | | Driver Description | System CMOS/real time clock
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Hardware ID | ACPI\PNP0B00
|
| | | PnP Device | Real-Time Clock
|
|
| | Device Resources:
|
| | | IRQ | 08
|
| | | Port | 0070-0077
|
|
| [ System devices / System timer ]
|
|
| | Device Properties:
|
| | | Driver Description | System timer
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Hardware ID | ACPI\PNP0100
|
| | | PnP Device | System Timer
|
|
| | Device Resources:
|
| | | IRQ | 00
|
| | | Port | 0040-0043
|
| | | Port | 0050-0053
|
|
| [ System devices / Terminal Server Keyboard Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Terminal Server Keyboard Driver
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | RDP_KBD
|
| | | Hardware ID | ROOT\RDP_KBD
|
|
| [ System devices / Terminal Server Mouse Driver ]
|
|
| | Device Properties:
|
| | | Driver Description | Terminal Server Mouse Driver
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | RDP_MOU
|
| | | Hardware ID | ROOT\RDP_MOU
|
|
| [ System devices / UMBus Enumerator ]
|
|
| | Device Properties:
|
| | | Driver Description | UMBus Enumerator
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | umbus.inf
|
| | | INF Section | UmBus_Device.NT
|
| | | Hardware ID | UMB\UMBUS
|
|
| [ System devices / UMBus Root Bus Enumerator ]
|
|
| | Device Properties:
|
| | | Driver Description | UMBus Root Bus Enumerator
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | umbus.inf
|
| | | INF Section | UmBusRoot_Device.NT
|
| | | Hardware ID | root\umbus
|
|
| [ System devices / Volume Manager ]
|
|
| | Device Properties:
|
| | | Driver Description | Volume Manager
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | machine.inf
|
| | | INF Section | Volmgr
|
| | | Hardware ID | ROOT\VOLMGR
|
|
| [ System devices / Xeon E3-1200/2nd Generation Intel(R) Core(TM) Processor Family PCI Express Root Port - 0101 ]
|
|
| | Device Properties:
|
| | | Driver Description | Xeon E3-1200/2nd Generation Intel(R) Core(TM) Processor Family PCI Express Root Port - 0101
|
| | | Driver Date | 7/25/2013
|
| | | Driver Version | 9.2.0.1035
|
| | | Driver Provider | Intel
|
| | | INF File | oem8.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Hardware ID | PCI\VEN_8086&DEV_0101&SUBSYS_12871043&REV_09
|
| | | Location Information | PCI bus 0, device 1, function 0
|
| | | PCI Device | Intel Sandy Bridge - PCI Express Controller
|
|
| | Device Resources:
|
| | | IRQ | 17
|
| | | Memory | 000A0000-000BFFFF
|
| | | Memory | C0000000-D1FFFFFF
|
| | | Memory | DC000000-DD0FFFFF
|
| | | Port | 03B0-03BB
|
| | | Port | 03C0-03DF
|
| | | Port | D000-DFFF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Universal Serial Bus controllers / ASMedia XHCI Controller ]
|
|
| | Device Properties:
|
| | | Driver Description | ASMedia XHCI Controller
|
| | | Driver Date | 10/24/2014
|
| | | Driver Version | 1.16.22.0
|
| | | Driver Provider | ASMedia Technology Inc
|
| | | INF File | oem5.inf
|
| | | INF Section | ASMEDIA_Product7_Install.NTAMD64
|
| | | Hardware ID | PCI\VEN_1B21&DEV_1042&SUBSYS_10591043&REV_00
|
| | | Location Information | PCI bus 4, device 0, function 0
|
| | | PCI Device | ASMedia ASM1042 USB 3.0 xHCI Controller
|
|
| | Device Resources:
|
| | | IRQ | 65536
|
| | | Memory | DDC00000-DDC07FFF
|
|
| [ Universal Serial Bus controllers / Generic USB Hub ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic USB Hub
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usb.inf
|
| | | INF Section | StandardHub.Dev.NT
|
| | | Hardware ID | USB\VID_8087&PID_0024&REV_0000
|
| | | Location Information | Port_#0001.Hub_#0002
|
|
| [ Universal Serial Bus controllers / Generic USB Hub ]
|
|
| | Device Properties:
|
| | | Driver Description | Generic USB Hub
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usb.inf
|
| | | INF Section | StandardHub.Dev.NT
|
| | | Hardware ID | USB\VID_8087&PID_0024&REV_0000
|
| | | Location Information | Port_#0001.Hub_#0001
|
|
| [ Universal Serial Bus controllers / Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C26 ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C26
|
| | | Driver Date | 7/31/2013
|
| | | Driver Version | 9.2.0.1036
|
| | | Driver Provider | Intel
|
| | | INF File | oem13.inf
|
| | | INF Section | Intel_EHCI.Dev.NT
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C26&SUBSYS_12871043&REV_05
|
| | | Location Information | PCI bus 0, device 29, function 0
|
| | | PCI Device | Intel Cougar Point PCH - USB EHCI #1 Controller [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 23
|
| | | Memory | DFA07000-DFA073FF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Universal Serial Bus controllers / Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C2D ]
|
|
| | Device Properties:
|
| | | Driver Description | Intel(R) 6 Series/C200 Series Chipset Family USB Enhanced Host Controller - 1C2D
|
| | | Driver Date | 7/31/2013
|
| | | Driver Version | 9.2.0.1036
|
| | | Driver Provider | Intel
|
| | | INF File | oem13.inf
|
| | | INF Section | Intel_EHCI.Dev.NT
|
| | | Hardware ID | PCI\VEN_8086&DEV_1C2D&SUBSYS_12871043&REV_05
|
| | | Location Information | PCI bus 0, device 26, function 0
|
| | | PCI Device | Intel Cougar Point PCH - USB EHCI #2 Controller [B-3]
|
|
| | Device Resources:
|
| | | IRQ | 16
|
| | | Memory | DFA08000-DFA083FF
|
|
| | Chipset Manufacturer:
|
| | | Company Name | Intel Corporation
|
| | | Product Information | http://www.intel.com/products/chipsets
|
| | | Driver Download | http://support.intel.com/support/chipsets
|
| | | BIOS Upgrades | http://www.aida64.com/bios-updates
|
| | | Driver Update | http://www.aida64.com/driver-updates
|
|
| [ Universal Serial Bus controllers / Realtek USB 2.0 Card Reader ]
|
|
| | Device Properties:
|
| | | Driver Description | Realtek USB 2.0 Card Reader
|
| | | Driver Date | 1/3/2014
|
| | | Driver Version | 6.3.9600.39057
|
| | | Driver Provider | Realtek
|
| | | INF File | oem15.inf
|
| | | INF Section | RSUSBVSTOR.NTAMD64
|
| | | Hardware ID | USB\VID_0BDA&PID_0139&REV_3960
|
| | | Location Information | Port_#0004.Hub_#0003
|
|
| [ Universal Serial Bus controllers / USB Composite Device ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Composite Device
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usb.inf
|
| | | INF Section | Composite.Dev.NT
|
| | | Hardware ID | USB\VID_058F&PID_A014&REV_0003
|
| | | Location Information | Port_#0002.Hub_#0003
|
|
| [ Universal Serial Bus controllers / USB Mass Storage Device ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Mass Storage Device
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usbstor.inf
|
| | | INF Section | USBSTOR_BULK.NT
|
| | | Hardware ID | USB\VID_2537&PID_1066&REV_0100
|
| | | Location Information | Port_#0002.Hub_#0004
|
|
| [ Universal Serial Bus controllers / USB Root Hub ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Root Hub
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usbport.inf
|
| | | INF Section | ROOTHUB.Dev.NT
|
| | | Hardware ID | USB\ROOT_HUB20&VID8086&PID1C26&REV0005
|
|
| [ Universal Serial Bus controllers / USB Root Hub ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Root Hub
|
| | | Driver Date | 6/21/2006
|
| | | Driver Version | 6.1.7601.17514
|
| | | Driver Provider | Microsoft
|
| | | INF File | usbport.inf
|
| | | INF Section | ROOTHUB.Dev.NT
|
| | | Hardware ID | USB\ROOT_HUB20&VID8086&PID1C2D&REV0005
|
|
| [ Universal Serial Bus controllers / USB Root Hub ]
|
|
| | Device Properties:
|
| | | Driver Description | USB Root Hub
|
| | | Driver Date | 10/24/2014
|
| | | Driver Version | 1.16.22.0
|
| | | Driver Provider | ASMedia Technology Inc
|
| | | INF File | oem6.inf
|
| | | INF Section | RootHub_Product1_Install.NTAMD64
|
| | | Hardware ID | USB\ASMEDIAUSBD_Hub&VID_040E&PID_0100&REV_0000
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Warning | 1 | 2015-10-07 04:10:50 | | Windows Search Service | 1008: The Windows Search Service is starting up and attempting to remove the old search index {Reason: Full Index Reset}.
|
| | Application | Warning | None | 2015-10-07 04:17:06 | SYSTEM | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 1 user registry handles leaked from \Registry\User\S-1-5-21-2283534224-2209397732-517526467-1000: Process 700 (\Device\HarddiskVolume4\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-2283534224-2209397732-517526467-1000
|
| | Application | Warning | 3 | 2015-10-07 04:18:55 | | Windows Search Service | 3036: The content source <csc://{S-1-5-21-2283534224-2209397732-517526467-1000}/> cannot be accessed. Context: Application, SystemIndex Catalog Details: The URL was already processed during this update. If you received this message while processing alerts, then the alerts are redundant, or else Modify should be used instead of Add. (HRESULT : 0x80040d0d) (0x80040d0d)
|
| | Application | Error | None | 2015-10-07 04:22:02 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 07:31:51 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 12:13:34 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 12:19:55 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 13:13:04 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 15:40:57 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-07 18:10:44 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Application | Error | None | 2015-10-09 05:48:18 | | Microsoft-Windows-CAPI2 | 4107: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file. .
|
| | Application | Error | None | 2015-10-09 05:49:00 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Security | Audit Success | 12288 | 2015-10-07 04:10:49 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process Information: Process ID: 0x350 Name: C:\Windows\System32\oobe\msoobe.exe Previous Time: 2015-10-07T11:10:49.925818500Z New Time: 2015-10-06T21:10:49.801000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:49 | | Microsoft-Windows-Security-Auditing | 4720: A user account was created. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Attributes: SAM Account Name: huytv Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 Allowed To Delegate To: - Old UAC Value: 0x0 New UAC Value: 0x15 User Account Control: %%2080 %%2082 %%2084 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges -
|
| | Security | Audit Success | 13826 | 2015-10-07 04:10:49 | | Microsoft-Windows-Security-Auditing | 4728: A member was added to a security-enabled global group. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: - Group: Security ID: S-1-5-21-2283534224-2209397732-517526467-513 Group Name: None Group Domain: huytv-PC Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 04:10:49 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4722: A user account was enabled. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Changed Attributes: SAM Account Name: huytv Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x15 New UAC Value: 0x14 User Account Control: %%2048 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Changed Attributes: SAM Account Name: huytv Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x214 User Account Control: %%2089 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Changed Attributes: SAM Account Name: huytv Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 10/7/2015 4:10:50 AM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x214 New UAC Value: 0x214 User Account Control: - User Parameters: - SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4724: An attempt was made to reset an account's password. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC
|
| | Security | Audit Success | 13826 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: - Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 04:10:50 | | Microsoft-Windows-Security-Auditing | 4733: A member was removed from a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-10-07 04:10:51 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:10:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x2c933 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-TPI17MVV42Q Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:10:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x2c974 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2bc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: WIN-TPI17MVV42Q Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:10:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x2c933 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 04:12:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:12:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12290 | 2015-10-07 04:13:51 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-07 04:14:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:14:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:14:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:14:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 04:15:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:15:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-10-07 04:17:06 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x2c974 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 103 | 2015-10-07 04:17:07 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Wdfres.dll Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wbem\Wdf01000.mof Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\drivers\WdfLdr.sys Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\drivers\Wdf01000.sys Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\drivers\MsftWdf_Kernel_01011_Inbox_Critical.Wdf Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\drivers\en-US\wdf01000.sys.mui Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 04:17:07 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\en-US\wdfres.dll.mui Handle ID: 0x1c Process Information: Process ID: 0x7b4 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 12288 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x220 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x142dc Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x220 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14341 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x220 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x142dc Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 04:18:48 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8ec6
|
| | Security | Audit Success | 12292 | 2015-10-07 04:18:49 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20d6c Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:18:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x200 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:18:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 04:19:51 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-07 04:19:51 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14341 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15dde Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15e29 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15dde Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 04:20:09 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8d27
|
| | Security | Audit Success | 12292 | 2015-10-07 04:20:10 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1f8be Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:20:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:20:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 04:22:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:22:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 04:22:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:22:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 04:23:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 04:23:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 04:23:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 04:23:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 04:23:17 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0xf3c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x88334
|
| | Security | Audit Success | 13568 | 2015-10-07 04:23:17 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0xf3c Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x88334
|
| | Security | Audit Success | 12288 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 06:44:23 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x852a
|
| | Security | Audit Success | 12290 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x240 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x148cc Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x240 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14918 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x240 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20a97 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x148cc Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 06:44:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x228 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 06:44:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-10-07 06:44:37 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14918 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 103 | 2015-10-07 06:44:38 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12288 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 07:29:57 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x862e
|
| | Security | Audit Success | 12290 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14e68 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14ee5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1fdce Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 07:29:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14e68 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 07:30:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 07:30:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 07:31:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 07:31:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 07:34:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-10-07 07:34:53 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14ee5 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12548 | 2015-10-07 07:34:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 07:34:54 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12288 | 2015-10-07 11:23:26 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x1e0 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-10-06T21:23:25.979218300Z New Time: 2015-10-07T04:23:26.736485300Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-10-07 11:23:26 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x1e0 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-10-07T04:23:26.739485300Z New Time: 2015-10-07T04:23:26.739000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-10-07 11:23:26 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x1e0 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-10-07T04:23:26.743000200Z New Time: 2015-10-07T04:23:26.743000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12544 | 2015-10-07 11:28:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x204 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-10-07 11:28:26 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15e29 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12548 | 2015-10-07 11:28:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuaueng.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wups2.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuauclt.exe Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wucltux.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\en-US\wuaueng.dll.mui Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\en-US\wucltux.dll.mui Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuapp.exe Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuwebv.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\wuapp.exe Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\wuwebv.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wups.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wudriver.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuapi.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\en-US\wuapi.dll.mui Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\wups.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\wudriver.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\wuapi.dll Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-10-07 11:28:28 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SysWOW64\en-US\wuapi.dll.mui Handle ID: 0x1c Process Information: Process ID: 0x9e0 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 103 | 2015-10-07 11:28:29 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12288 | 2015-10-07 12:11:40 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 12:11:40 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8713
|
| | Security | Audit Success | 12290 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16250 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x162c5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20430 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:41 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16250 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 12:11:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:11:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 12:13:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:13:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 12:14:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:14:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12288 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 12:18:02 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8e40
|
| | Security | Audit Success | 12292 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x191ba Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x238 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1e912 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x238 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1e977 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x238 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1e912 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 12:18:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:18:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 12:20:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:20:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 12:23:15 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-07 12:23:15 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1e977 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 103 | 2015-10-07 12:26:56 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:26:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-10-07 12:26:56 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x162c5 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:26:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12288 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15417 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x154a4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15417 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 12:42:46 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8ce3
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20955 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 12:42:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 12:42:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 12:43:14 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-07 12:43:14 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x154a4 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 13:11:11 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8bf1
|
| | Security | Audit Success | 12292 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1594b Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15991 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x209f7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1594b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 13:11:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:11:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 13:13:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:13:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 13:29:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:29:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1270d0 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1270de Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x248 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1270de Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1270d0 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-10-07 13:36:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1270d0 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12545 | 2015-10-07 13:41:16 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x15991 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 103 | 2015-10-07 13:41:17 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12288 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 15:39:03 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x860b
|
| | Security | Audit Success | 12292 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x148bd Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14918 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20150 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x148bd Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 15:39:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 15:39:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 15:41:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 15:41:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 16:10:37 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:10:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-10-07 16:10:37 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14918 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12548 | 2015-10-07 16:10:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12288 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 16:21:42 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x86f3
|
| | Security | Audit Success | 12292 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14d0a Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14d59 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x2001d Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14d0a Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 16:21:49 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 16:21:49 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 16:21:57 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-07 16:21:57 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14d59 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x31781
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Attributes: SAM Account Name: Network Configuration Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Attributes: SAM Account Name: Power Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Attributes: SAM Account Name: Cryptographic Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Attributes: SAM Account Name: Backup Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Attributes: SAM Account Name: Replicator SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4731: A security-enabled local group was created. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Attributes: SAM Account Name: Remote Desktop Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:06:55 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-10-07 18:06:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:06:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:07:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-10-07 18:07:02 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:07:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x4095f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13824 | 2015-10-07 18:07:58 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-500 Account Name: Administrator Account Domain: 37L4247F27-25 Changed Attributes: SAM Account Name: - Display Name: - User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: 37L4247F27-25$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x198 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-07 18:08:20 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12288 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-07 18:08:53 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x89b9
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-07 18:08:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-07 18:10:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:10:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-10-07 18:10:39 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-07 18:10:39 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:10:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1a0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-07 18:10:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x214fb Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-07 18:10:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-500 Account Name: Administrator Account Domain: huytv-PC Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 11/20/2010 8:57:24 PM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-500 Account Name: Administrator Account Domain: huytv-PC Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 11/20/2010 8:57:24 PM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-501 Account Name: Guest Account Domain: huytv-PC Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-2283534224-2209397732-517526467-501 Account Name: Guest Account Domain: huytv-PC Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-544 Account Domain: Builtin Old Account Name: Administrators New Account Name: Administrators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-545 Account Domain: Builtin Old Account Name: Users New Account Name: Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-546 Account Domain: Builtin Old Account Name: Guests New Account Name: Guests Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-551 Account Domain: Builtin Old Account Name: Backup Operators New Account Name: Backup Operators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-552 Account Domain: Builtin Old Account Name: Replicator New Account Name: Replicator Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-555 Account Domain: Builtin Old Account Name: Remote Desktop Users New Account Name: Remote Desktop Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-556 Account Domain: Builtin Old Account Name: Network Configuration Operators New Account Name: Network Configuration Operators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-547 Account Domain: Builtin Old Account Name: Power Users New Account Name: Power Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-558 Account Domain: Builtin Old Account Name: Performance Monitor Users New Account Name: Performance Monitor Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-559 Account Domain: Builtin Old Account Name: Performance Log Users New Account Name: Performance Log Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-562 Account Domain: Builtin Old Account Name: Distributed COM Users New Account Name: Distributed COM Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-568 Account Domain: Builtin Old Account Name: IIS_IUSRS New Account Name: IIS_IUSRS Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-569 Account Domain: Builtin Old Account Name: Cryptographic Operators New Account Name: Cryptographic Operators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-573 Account Domain: Builtin Old Account Name: Event Log Readers New Account Name: Event Log Readers Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: Event Log Readers SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: Administrators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: Guests SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Changed Attributes: SAM Account Name: Backup Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-552 Group Name: Replicator Group Domain: Builtin Changed Attributes: SAM Account Name: Replicator SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-555 Group Name: Remote Desktop Users Group Domain: Builtin Changed Attributes: SAM Account Name: Remote Desktop Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-556 Group Name: Network Configuration Operators Group Domain: Builtin Changed Attributes: SAM Account Name: Network Configuration Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-547 Group Name: Power Users Group Domain: Builtin Changed Attributes: SAM Account Name: Power Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Monitor Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Log Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: Distributed COM Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: IIS_IUSRS SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-569 Group Name: Cryptographic Operators Group Domain: Builtin Changed Attributes: SAM Account Name: Cryptographic Operators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-10-07 18:10:43 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: WIN-TPI17MVV42Q$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12288 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-08 03:22:17 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8703
|
| | Security | Audit Success | 12292 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14b30 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14bb4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20564 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14b30 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-08 03:22:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 03:22:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-08 03:23:04 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-08 03:23:04 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14bb4 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-08 14:02:12 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x85f3
|
| | Security | Audit Success | 12290 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1bdf7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1bed7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1ee46 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1bdf7 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-08 14:02:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-08 14:02:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-08 14:02:26 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-08 14:02:26 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x1bed7 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-09 00:16:53 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-09 00:16:53 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x896d
|
| | Security | Audit Success | 12290 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x164f5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x165c9 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x244 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 00:16:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x164f5 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-09 00:16:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1ec8b Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 00:17:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 00:17:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-09 00:17:10 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-09 00:17:10 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x165c9 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12290 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-09 04:50:16 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x84a5
|
| | Security | Audit Success | 12292 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16d00 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16da6 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x338 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x1ec76 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16d00 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-09 04:50:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x224 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 04:50:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 103 | 2015-10-09 04:50:31 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 12545 | 2015-10-09 04:50:31 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x16da6 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12288 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-10-09 05:47:04 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8978
|
| | Security | Audit Success | 12290 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Security | Audit Success | 12292 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12292 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: huytv Account Domain: huytv-PC Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x26c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14255 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x26c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14292 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x26c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: HUYTV-PC Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x20d95 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2283534224-2209397732-517526467-1000 Account Name: huytv Account Domain: huytv-PC Logon ID: 0x14255 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-09 05:47:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 05:47:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-09 05:49:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 05:49:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-10-09 05:50:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: HUYTV-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x218 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-10-09 05:50:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | System | Warning | None | 2015-10-07 04:14:05 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 04:14:09 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 04:14:09 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 04:14:13 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 04:14:17 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 04:14:17 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 04:17:08 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 04:17:37 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 04:17:41 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 04:18:48 | | EventLog | 6008: The previous system shutdown at 4:17:33 AM on ?10/?7/?2015 was unexpected.
|
| | System | Warning | None | 2015-10-07 04:18:51 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 04:18:55 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 04:18:55 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 04:19:51 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 04:20:12 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 04:20:16 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 04:20:16 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 06:44:27 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 06:44:31 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 06:44:31 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 06:44:38 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 07:30:01 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 07:30:05 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 07:30:05 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 07:34:55 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Error | 1 | 2015-10-07 11:23:33 | SYSTEM | Microsoft-Windows-WindowsUpdateClient | 20: Installation Failure: Windows failed to install the following update with error 0x8024d00e: Windows Update Core.
|
| | System | Warning | None | 2015-10-07 11:28:29 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 12:11:44 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 12:11:48 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 12:11:48 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 12:18:03 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: cdrom
|
| | System | Warning | None | 2015-10-07 12:18:05 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 12:18:09 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 12:18:09 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 12:23:16 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 12:26:57 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 12:42:49 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 12:42:53 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 12:42:53 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 12:43:15 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 13:11:15 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 13:11:19 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 13:11:19 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 13:25:31 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name dns.msftncsi.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-10-07 13:25:41 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name coccoc.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-10-07 13:25:46 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name dns.msftncsi.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-10-07 13:25:47 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name searcher.qc.coccoc.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-10-07 13:41:17 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 15:39:07 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 15:39:11 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 15:39:11 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 16:00:55 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name twitter.com timed out after none of the configured DNS servers responded.
|
| | System | Warning | None | 2015-10-07 16:10:38 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 16:21:46 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 16:21:50 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 16:21:50 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 16:21:58 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-07 18:07:56 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 18:08:00 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 18:08:00 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-07 18:08:54 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-07 18:08:58 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-07 18:08:58 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-08 03:22:21 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-08 03:22:25 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-08 03:22:25 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-08 03:23:04 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-08 14:02:16 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-08 14:02:20 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-08 14:02:20 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-08 14:02:27 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-09 00:16:57 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-09 00:17:01 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-09 00:17:01 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-09 00:17:11 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-09 04:50:20 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-09 04:50:24 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-09 04:50:24 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Warning | None | 2015-10-09 04:50:32 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | System | Warning | None | 2015-10-09 05:47:08 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|
| | System | Error | None | 2015-10-09 05:47:12 | | BTHUSB | 17: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
|
| | System | Warning | None | 2015-10-09 05:47:12 | | BTHUSB | 3: A command sent to the adapter has timed out. The adapter did not respond.
|