| | | |
|
| | DLL File | Version | Description
|
| | abovelockapphost.dll | 6.2.10240.16384 | AboveLockAppHost
|
| | accessibilitycpl.dll | 6.2.10240.16384 | Ease of access control panel
|
| | accountscontrolinternal.dll | 6.2.10240.16384 | Accounts Control Broker Objects
|
| | acctres.dll | 6.2.10240.16384 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 6.2.10240.16384 | Access Control List Editor
|
| | aclui.dll | 6.2.10240.16384 | Security Descriptor Editor
|
| | acppage.dll | 6.2.10240.16384 | Compatibility Tab Shell Extension Library
|
| | actioncenter.dll | 6.2.10240.16427 | Security and Maintenance
|
| | actioncentercpl.dll | 6.2.10240.16384 | Security and Maintenance Control Panel
|
| | activationclient.dll | 6.2.10240.16384 | Activation Client
|
| | activeds.dll | 6.2.10240.16384 | ADs Router Layer DLL
|
| | actxprxy.dll | 6.2.10240.16390 | ActiveX Interface Marshaling Library
|
| | addressparser.dll | 6.2.10240.16384 | ADDRESSPARSER
|
| | adprovider.dll | 6.2.10240.16384 | adprovider DLL
|
| | adsldp.dll | 6.2.10240.16384 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 6.2.10240.16384 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 6.2.10240.16384 | ADs LDAP Provider DLL
|
| | adsnt.dll | 6.2.10240.16384 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 6.2.10240.16384 | Security Audit Schema DLL
|
| | advapi32.dll | 6.2.10240.16384 | Advanced Windows 32 Base API
|
| | advapi32res.dll | 6.2.10240.16384 | Advanced Windows 32 Base API
|
| | advpack.dll | 11.0.10240.16384 | ADVPACK
|
| | aeevts.dll | 6.2.10240.16384 | Application Experience Event Resources
|
| | amsi.dll | 4.8.10240.16384 | Anti-Malware Scan Interface
|
| | amstream.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | apds.dll | 6.2.10240.16384 | Microsoft® Help Data Services Module
|
| | appcapture.dll | 6.2.10240.16384 | Windows Runtime AppCapture DLL
|
| | appcontracts.dll | 6.2.10240.16387 | Windows AppContracts API Server
|
| | apphelp.dll | 6.2.10240.16384 | Application Compatibility Client Library
|
| | apphlpdm.dll | 6.2.10240.16384 | Application Compatibility Help Module
|
| | appidapi.dll | 6.2.10240.16384 | Application Identity APIs Dll
|
| | applockercsp.dll | 6.2.10240.16384 | AppLockerCSP
|
| | appointmentactivation.dll | 6.2.10240.16384 | DLL for AppointmentActivation
|
| | appointmentapis.dll | 6.2.10240.16384 | DLL for CalendarRT
|
| | apprepapi.dll | 6.2.10240.16384 | Application Reputation APIs Dll
|
| | apprepsync.dll | 6.2.10240.16384 | AppRepSync Task
|
| | appxalluserstore.dll | 6.2.10240.16389 | AppX All User Store DLL
|
| | appxapplicabilityengine.dll | 6.2.10240.16384 | AppX Applicability Engine
|
| | appxdeploymentclient.dll | 6.2.10240.16445 | AppX Deployment Client DLL
|
| | appxpackaging.dll | 6.2.10240.16384 | Native Code Appx Packaging Library
|
| | appxsip.dll | 6.2.10240.16384 | Appx Subject Interface Package
|
| | asferror.dll | 12.0.10240.16384 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.6.79.0 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 6.2.10240.16384 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.1 | ATL Module for Windows
|
| | atlthunk.dll | 6.2.10240.16384 | atlthunk.dll
|
| | atmfd.dll | 5.1.2.243 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.243 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 6.2.10240.16384 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 6.2.10240.16412 | Audio Engine
|
| | audiokse.dll | 6.2.10240.16384 | Audio Ks Endpoint
|
| | audioses.dll | 6.2.10240.16412 | Audio Session
|
| | authbroker.dll | 6.2.10240.16384 | Web Authentication WinRT API
|
| | authbrokerui.dll | 6.2.10240.16384 | AuthBroker UI
|
| | authext.dll | 6.2.10240.16384 | Authentication Extensions
|
| | authfwcfg.dll | 6.2.10240.16384 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 6.2.10240.16384 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 6.2.10240.16384 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 6.2.10240.16384 | Wizard Framework
|
| | authui.dll | 6.2.10240.16384 | Windows Authentication UI
|
| | authz.dll | 6.2.10240.16384 | Authorization Framework
|
| | autoplay.dll | 6.2.10240.16384 | AutoPlay Control Panel
|
| | avicap32.dll | 6.2.10240.16384 | AVI Capture window class
|
| | avifil32.dll | 6.2.10240.16384 | Microsoft AVI File support library
|
| | avrt.dll | 6.2.10240.16384 | Multimedia Realtime Runtime
|
| | azroles.dll | 6.2.10240.16384 | azroles Module
|
| | azroleui.dll | 6.2.10240.16384 | Authorization Manager
|
| | azsqlext.dll | 6.2.10240.16384 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | azuresettingsyncprovider.dll | 6.2.10240.16384 | Azure Setting Sync Provider
|
| | backgroundmediapolicy.dll | 6.2.10240.16384 | <d> Background Media Policy DLL
|
| | basecsp.dll | 6.2.10240.16384 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 6.2.10240.16384 | Battery Meter Helper DLL
|
| | bcastdvr.proxy.dll | 6.2.10240.16384 | Broadcast DVR Proxy
|
| | bcd.dll | 6.2.10240.16393 | BCD DLL
|
| | bcp47langs.dll | 6.2.10240.16384 | BCP47 Language Classes
|
| | bcrypt.dll | 6.2.10240.16384 | Windows Cryptographic Primitives Library
|
| | bcryptprimitives.dll | 6.2.10240.16384 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 6.2.10240.16384 | Bidispl DLL
|
| | bingmaps.dll | 6.2.10240.16392 | Bing Map Control
|
| | bingonlineservices.dll | 6.2.10240.16384 | Bing online services
|
| | biocredprov.dll | 6.2.10240.16384 | WinBio Credential Provider
|
| | bitsperf.dll | 7.8.10240.16384 | Perfmon Counter Access
|
| | bitsproxy.dll | 7.8.10240.16384 | Background Intelligent Transfer Service Proxy
|
| | biwinrt.dll | 6.2.10240.16384 | Windows Background Broker Infrastructure
|
| | blackbox.dll | 11.0.10240.16384 | BlackBox DLL
|
| | bluetoothapis.dll | 6.2.10240.16384 | Bluetooth Usermode Api host
|
| | bootvid.dll | 6.2.10240.16384 | VGA Boot Driver
|
| | browcli.dll | 6.2.10240.16384 | Browser Service Client DLL
|
| | browsersettingsync.dll | 6.2.10240.16384 | Browser Setting Synchronization
|
| | browseui.dll | 6.2.10240.16384 | Shell Browser UI Library
|
| | btpanui.dll | 6.2.10240.16384 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | c_g18030.dll | 6.2.10240.16384 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_gsm7.dll | 6.2.10240.16384 | GSM 7bit Code Page Translation DLL for SMS
|
| | c_is2022.dll | 6.2.10240.16384 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 6.2.10240.16384 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 6.2.10240.16384 | Microsoft® Cabinet File API
|
| | cabview.dll | 6.2.10240.16384 | Cabinet File Viewer Shell Extension
|
| | callbuttons.dll | 6.2.10240.16384 | Windows Runtime CallButtonsServer DLL
|
| | callbuttons.proxystub.dll | 6.2.10240.16384 | Windows Runtime CallButtonsServer ProxyStub DLL
|
| | callhistoryclient.dll | 6.2.10240.16384 | Client DLL for accessing CallHistory information
|
| | cameracaptureui.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | capiprovider.dll | 6.2.10240.16384 | capiprovider DLL
|
| | capisp.dll | 6.2.10240.16384 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 6.2.10240.16384 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.10240.16384 | Microsoft CDO for Windows Library
|
| | cdp.dll | 6.2.10240.16384 | Microsoft (R) CDP Client API
|
| | cemapi.dll | 6.2.10240.16384 | CEMAPI
|
| | certca.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services CA
|
| | certcli.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 6.2.10240.16384 | Cert Credential Provider
|
| | certenc.dll | 6.2.10240.16384 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 6.2.10240.16384 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 6.2.10240.16384 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 6.2.10240.16384 | Certificates snap-in
|
| | certpoleng.dll | 6.2.10240.16384 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.10240.16384 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 6.2.10240.16384 | Configuration Backend Interface
|
| | cfgmgr32.dll | 6.2.10240.16384 | Configuration Manager DLL
|
| | cfmifs.dll | 6.2.10240.16384 | FmIfs Engine
|
| | cfmifsproxy.dll | 6.2.10240.16384 | Microsoft® FmIfs Proxy Library
|
| | chakra.dll | 11.0.10240.16431 | Microsoft ® JScript
|
| | chakradiag.dll | 11.0.10240.16384 | Microsoft ® JScript Diagnostics
|
| | chartv.dll | 6.2.10240.16384 | Chart View
|
| | chatapis.dll | 6.2.10240.16384 | DLL for ChatRT
|
| | chxreadingstringime.dll | 6.2.10240.16384 | CHxReadingStringIME
|
| | cic.dll | 6.2.10240.16384 | CIC - MMC controls for Taskpad
|
| | cilkrts20_32.dll | 2.0.4232.0 | Intel® Cilk™ Plus Runtime
|
| | clb.dll | 6.2.10240.16384 | Column List Box
|
| | clbcatq.dll | 2001.12.10941.16384 | COM+ Configuration Catalog
|
| | clfsw32.dll | 6.2.10240.16384 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 6.2.10240.16384 | SQL Client Configuration Utility DLL
|
| | clipboardserver.dll | 6.2.10240.16384 | Modern Clipboard API Server
|
| | clipc.dll | 6.2.10240.16384 | Client Licensing Platform Client
|
| | clrhost.dll | 6.2.10240.16384 | In Proc server for managed servers in the Windows Runtime
|
| | clusapi.dll | 6.2.10240.16384 | Cluster API Library
|
| | cmcfg32.dll | 7.2.10240.16384 | Microsoft Connection Manager Configuration Dll
|
| | cmdext.dll | 6.2.10240.16384 | cmd.exe Extension DLL
|
| | cmdial32.dll | 7.2.10240.16384 | Microsoft Connection Manager
|
| | cmifw.dll | 6.2.10240.16384 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 6.2.10240.16384 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.10240.16384 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.10240.16384 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.10240.16384 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.10240.16384 | Microsoft Connection Manager Utility Lib
|
| | cngcredui.dll | 6.2.10240.16384 | Microsoft CNG CredUI Provider
|
| | cngprovider.dll | 6.2.10240.16384 | cngprovider DLL
|
| | cnvfat.dll | 6.2.10240.16384 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.10941.16384 | COM+
|
| | colorcnv.dll | 6.2.10240.16384 | Windows Media Color Conversion
|
| | colorui.dll | 6.2.10240.16384 | Microsoft Color Control Panel
|
| | combase.dll | 6.2.10240.16384 | Microsoft COM for Windows
|
| | comcat.dll | 6.2.10240.16384 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.10240.16384 | User Experience Controls Library
|
| | comdlg32.dll | 6.2.10240.16405 | Common Dialogs DLL
|
| | coml2.dll | 6.2.10240.16384 | Microsoft COM for Windows
|
| | common_clang32.dll | 4.0.0.0 | Intel(R) OpenCL(TM) Runtime
|
| | commstypehelperutil_ca.dll | 6.2.10240.16384 | Comms Type Helper Util
|
| | compobj.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | comppkgsup.dll | 12.0.10240.16384 | Component Package Support DLL
|
| | compstui.dll | 6.2.10240.16384 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.10941.16384 | COM+
|
| | comres.dll | 2001.12.10941.16384 | COM+ Resources
|
| | comsnap.dll | 2001.12.10941.16384 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.10941.16384 | COM+ Services
|
| | comuid.dll | 2001.12.10941.16384 | COM+ Explorer UI
|
| | configureexpandedstorage.dll | 6.2.10240.16384 | ConfigureExpandedStorage
|
| | connect.dll | 6.2.10240.16384 | Get Connected Wizards
|
| | connectedaccountstate.dll | 6.2.10240.16384 | ConnectedAccountState.dll
|
| | console.dll | 6.2.10240.16384 | Control Panel Console Applet
|
| | contactactivation.dll | 6.2.10240.16384 | DLL for ContactActivation
|
| | contactapis.dll | 6.2.10240.16397 | DLL for ContactsRT
|
| | coremessaging.dll | 6.2.10240.16397 | Microsoft CoreMessaging Dll
|
| | coremmres.dll | 6.2.10240.16384 | General Core Multimedia Resources
|
| | coreuicomponents.dll | |
|
| | cortana.persona.dll | 6.2.10240.16384 | Cortana.Persona
|
| | cortanamapihelper.dll | 6.2.10240.16384 | CortanaMapiHelper
|
| | cortanamapihelper.proxystub.dll | 6.2.10240.16384 | CortanaMapiHelper.ProxyStub
|
| | cpfilters.dll | 6.2.10240.16384 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | credentialmigrationhandler.dll | 6.2.10240.16384 | Credential Migration Handler
|
| | credprovdatamodel.dll | 6.2.10240.16412 | Cred Prov Data Model
|
| | credprovhost.dll | 6.2.10240.16384 | Credential Provider Framework Host
|
| | credprovs.dll | 6.2.10240.16384 | Credential Providers
|
| | credssp.dll | 6.2.10240.16384 | Credential Delegation Security Package
|
| | credui.dll | 6.2.10240.16384 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 6.2.10240.16384 | Crypto API32
|
| | cryptbase.dll | 6.2.10240.16384 | Base cryptographic API DLL
|
| | cryptdlg.dll | 6.2.10240.16384 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 6.2.10240.16384 | Cryptography Manager
|
| | cryptext.dll | 6.2.10240.16384 | Crypto Shell Extensions
|
| | cryptnet.dll | 6.2.10240.16384 | Crypto Network Related API
|
| | cryptngc.dll | 6.2.10240.16384 | Microsoft Passport API
|
| | cryptowinrt.dll | 6.2.10240.16384 | Crypto WinRT Library
|
| | cryptsp.dll | 6.2.10240.16384 | Cryptographic Service Provider API
|
| | crypttpmeksvc.dll | 6.2.10240.16384 | Cryptographic TPM Endorsement Key Services
|
| | cryptui.dll | 6.2.10240.16384 | Microsoft Trust UI Provider
|
| | cryptuiwizard.dll | 6.2.10240.16384 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 6.2.10240.16384 | XML DigSig API
|
| | cscapi.dll | 6.2.10240.16384 | Offline Files Win32 API
|
| | cscdll.dll | 6.2.10240.16384 | Offline Files Temporary Shim
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 6.2.10240.16384 | Microsoft D2D Library
|
| | d3d10.dll | 6.2.10240.16384 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 6.2.10240.16384 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 6.2.10240.16384 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 6.2.10240.16384 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 6.2.10240.16384 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 6.2.10240.16384 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 6.2.10240.16384 | Direct3D 11 Runtime
|
| | d3d12.dll | 6.2.10240.16384 | Direct3D 12 Runtime
|
| | d3d8.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3d8thk.dll | 6.2.10240.16384 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 6.2.10240.16412 | Direct3D 9 Runtime
|
| | d3dcompiler_47.dll | 6.2.10240.16384 | Direct3D HLSL Compiler
|
| | d3dim.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dim700.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dramp.dll | 6.2.10240.16384 | Microsoft Direct3D
|
| | d3dxof.dll | 6.2.10240.16384 | DirectX Files DLL
|
| | dabapi.dll | 6.2.10240.16384 | Desktop Activity Broker API
|
| | dafcdp.dll | 6.2.10240.16384 | DAF CDP Provider
|
| | dafprintprovider.dll | 6.2.10240.16384 | DAF Print Provider DLL
|
| | daotpcredentialprovider.dll | 6.2.10240.16384 | DirectAccess One-Time Password Credential Provider
|
| | dataclen.dll | 6.2.10240.16384 | Disk Space Cleaner for Windows
|
| | dataexchange.dll | 6.2.10240.16384 | Data exchange
|
| | davclnt.dll | 6.2.10240.16384 | Web DAV Client DLL
|
| | davhlpr.dll | 6.2.10240.16384 | DAV Helper DLL
|
| | dbgcore.dll | 6.2.10240.16384 | Windows Core Debugging Helpers
|
| | dbgeng.dll | 6.2.10240.16384 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 6.2.10240.16384 | Windows Image Helper
|
| | dbgmodel.dll | 6.2.10240.16384 | Windows Debugger Data Model
|
| | dbnetlib.dll | 6.2.10240.16384 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 6.2.10240.16384 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 6.2.10240.16384 | DCI Manager
|
| | dcomp.dll | 6.2.10240.16384 | Microsoft DirectComposition Library
|
| | ddaclsys.dll | 6.2.10240.16384 | SysPrep module for Resetting Data Drive ACL
|
| | ddoiproxy.dll | 6.2.10240.16384 | DDOI Interface Proxy
|
| | ddores.dll | 6.2.10240.16384 | Device Category information and resources
|
| | ddraw.dll | 6.2.10240.16384 | Microsoft DirectDraw
|
| | ddrawex.dll | 6.2.10240.16384 | Direct Draw Ex
|
| | defaultdevicemanager.dll | 6.2.10240.16384 | Default Device Manager
|
| | defaultprinterprovider.dll | 6.2.10240.16384 | Microsoft Windows Default Printer Provider
|
| | delegatorprovider.dll | 6.2.10240.16384 | WMI PassThru Provider for Storage Management
|
| | deskadp.dll | 6.2.10240.16384 | Advanced display adapter properties
|
| | deskmon.dll | 6.2.10240.16384 | Advanced display monitor properties
|
| | devdispitemprovider.dll | 6.2.10240.16384 | DeviceItem inproc devquery subsystem
|
| | devenum.dll | 6.2.10240.16384 | Device enumeration.
|
| | deviceaccess.dll | 6.2.10240.16384 | Device Broker And Policy COM Server
|
| | deviceassociation.dll | 6.2.10240.16384 | Device Association Client DLL
|
| | devicecenter.dll | 6.2.10240.16384 | Device Center
|
| | devicedisplaystatusmanager.dll | 6.2.10240.16384 | Device Display Status Manager
|
| | devicepairing.dll | 6.2.10240.16384 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 6.2.10240.16384 | Device Pairing Folder
|
| | devicepairingproxy.dll | 6.2.10240.16384 | Device Pairing Proxy Dll
|
| | devicesetupstatusprovider.dll | 6.2.10240.16384 | Device Setup Status Provider Dll
|
| | deviceuxres.dll | 6.2.10240.16384 | Windows Device User Experience Resource File
|
| | devmgr.dll | 6.2.10240.16384 | Device Manager MMC Snapin
|
| | devobj.dll | 6.2.10240.16384 | Device Information Set DLL
|
| | devrtl.dll | 6.2.10240.16384 | Device Management Run Time Library
|
| | dfscli.dll | 6.2.10240.16384 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 6.2.10240.16384 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 6.2.10240.16384 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 6.2.10240.16384 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 6.2.10240.16384 | DHCP Client Service
|
| | dhcpcore6.dll | 6.2.10240.16384 | DHCPv6 Client
|
| | dhcpcsvc.dll | 6.2.10240.16384 | DHCP Client Service
|
| | dhcpcsvc6.dll | 6.2.10240.16384 | DHCPv6 Client
|
| | dhcpsapi.dll | 6.2.10240.16384 | DHCP Server API Stub DLL
|
| | dialclient.dll | 12.0.10240.16384 | DIAL DLL
|
| | dictationmanager.dll | 6.2.0.1 | Dictation Manager
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 6.2.10240.16384 | DIMS Job DLL
|
| | dimsroam.dll | 6.2.10240.16384 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 6.2.10240.16384 | Microsoft DirectInput
|
| | dinput8.dll | 6.2.10240.16384 | Microsoft DirectInput
|
| | directdb.dll | 6.2.10240.16384 | Microsoft Direct Database API
|
| | directmanipulation.dll | 6.2.10240.16431 | Microsoft Direct Manipulation Component
|
| | dismapi.dll | 6.2.10240.16384 | DISM API Framework
|
| | dispex.dll | 5.812.10240.16384 | Microsoft ® DispEx
|
| | display.dll | 6.2.10240.16384 | Display Control Panel
|
| | displaymanager.dll | 6.2.10240.16386 | DisplayManager
|
| | dlnashext.dll | 12.0.10240.16384 | DLNA Namespace DLL
|
| | dmband.dll | 6.2.10240.16384 | Microsoft DirectMusic Band
|
| | dmcmnutils.dll | 6.2.10240.16384 | dmcmnutils
|
| | dmcompos.dll | 6.2.10240.16384 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 6.2.10240.16384 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 6.2.10240.16384 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 6.2.10240.16384 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 6.2.10240.16384 | Disk Management Snap-in Resources
|
| | dmime.dll | 6.2.10240.16384 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 6.2.10240.16384 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 6.2.10240.16384 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 6.2.10240.16384 | TreeView OCX
|
| | dmscript.dll | 6.2.10240.16384 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 6.2.10240.16384 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 6.2.10240.16384 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 6.2.10240.16384 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 6.2.10240.16384 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 6.2.10240.16384 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 6.2.10240.16384 | DNS Client API DLL
|
| | dnscmmc.dll | 6.2.10240.16384 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 6.2.10240.16384 | OLE DocFile Property Page
|
| | dolbydecmft.dll | 6.2.10240.16384 | Media Foundation Dolby Digital Decoders
|
| | dot3api.dll | 6.2.10240.16384 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 6.2.10240.16384 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 6.2.10240.16384 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 6.2.10240.16384 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 6.2.10240.16384 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 6.2.10240.16384 | Dot3 Helper Class
|
| | dot3msm.dll | 6.2.10240.16384 | 802.3 Media Specific Module
|
| | dot3ui.dll | 6.2.10240.16384 | 802.3 Advanced UI
|
| | dpapi.dll | 6.2.10240.16384 | Data Protection API
|
| | dpapiprovider.dll | 6.2.10240.16384 | dpapiprovider DLL
|
| | dplayx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpmodemx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnaddr.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnathlp.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnet.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnhpast.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnhupnp.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpnlobby.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpwsockx.dll | 10.0.10240.16384 | DirectPlay Stub
|
| | dpx.dll | 6.2.10240.16384 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.10240.16384 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.10100.0 | DRMv2 Client DLL
|
| | drprov.dll | 6.2.10240.16384 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 6.2.10240.16384 | Distributed Routing Table
|
| | drtprov.dll | 6.2.10240.16384 | Distributed Routing Table Providers
|
| | drttransport.dll | 6.2.10240.16384 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 6.2.10240.16384 | Driver Store API
|
| | dsauth.dll | 6.2.10240.16384 | DS Authorization for Services
|
| | dsccoreconfprov.dll | 6.2.9200.16384 | DSC
|
| | dsclient.dll | 6.2.10240.16384 | Data Sharing Service Client DLL
|
| | dsdmo.dll | 6.2.10240.16384 | DirectSound Effects
|
| | dskquota.dll | 6.2.10240.16384 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 6.2.10240.16384 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 6.2.10240.16384 | DirectSound
|
| | dsparse.dll | 6.2.10240.16384 | Active Directory Domain Services API
|
| | dsprop.dll | 6.2.10240.16384 | Windows Active Directory Property Pages
|
| | dsquery.dll | 6.2.10240.16384 | Directory Service Find
|
| | dsreg.dll | 6.2.10240.16384 | AD/AAD User Device Registration
|
| | dsrole.dll | 6.2.10240.16384 | DS Setup Client DLL
|
| | dssec.dll | 6.2.10240.16384 | Directory Service Security UI
|
| | dssenh.dll | 6.2.10240.16384 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsui.dll | 6.2.10240.16384 | Device Setup UI Pages
|
| | dsuiext.dll | 6.2.10240.16384 | Directory Service Common UI
|
| | dswave.dll | 6.2.10240.16384 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 6.2.10240.16384 | Detection and Sharing Status API
|
| | dui70.dll | 6.2.10240.16384 | Windows DirectUI Engine
|
| | duser.dll | 6.2.10240.16384 | Windows DirectUser Engine
|
| | dwmapi.dll | 6.2.10240.16392 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 6.2.10240.16431 | Microsoft DWM Core Library
|
| | dwrite.dll | 6.2.10240.16430 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 6.2.10240.16384 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 6.2.10240.16412 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.10240.16384 | Microsoft Windows Media Component Removal File.
|
| | dxptasksync.dll | 6.2.10240.16384 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 11.0.10240.16384 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 11.0.10240.16384 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 6.2.10240.16384 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 6.2.10240.16384 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 6.2.10240.16384 | Eap Peer Config
|
| | eappgnui.dll | 6.2.10240.16384 | EAP Generic UI
|
| | eapphost.dll | 6.2.10240.16384 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 6.2.10240.16384 | Microsoft EAPHost Peer Client DLL
|
| | eapprovp.dll | 6.2.10240.16384 | EAP extension DLL
|
| | easwrt.dll | 6.2.10240.16384 | Exchange ActiveSync Windows Runtime DLL
|
| | edgehtml.dll | 11.0.10240.16431 | Microsoft (R) HTML Viewer
|
| | editbuffertesthook.dll | |
|
| | edpauditapi.dll | 6.2.10240.16384 | EDP Audit API
|
| | edputil.dll | 6.2.10240.16384 | EDP util
|
| | efsadu.dll | 6.2.10240.16384 | File Encryption Utility
|
| | efscore.dll | 6.2.10240.16392 | EFS Core Library
|
| | efsext.dll | |
|
| | efsutil.dll | 6.2.10240.16384 | EFS Utility Library
|
| | efswrt.dll | 6.2.10240.16384 | Storage Protection Windows Runtime DLL
|
| | ehstorapi.dll | 6.2.10240.16384 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 6.2.10240.16384 | Microsoft Enhanced Storage Password Manager
|
| | els.dll | 6.2.10240.16384 | Event Viewer Snapin
|
| | elscore.dll | 6.2.10240.16384 | Els Core Platform DLL
|
| | elshyph.dll | 6.2.10240.16384 | ELS Hyphenation Service
|
| | elslad.dll | 6.2.10240.16384 | ELS Language Detection
|
| | elstrans.dll | 6.2.10240.16384 | ELS Transliteration Service
|
| | emailapis.dll | 6.2.10240.16384 | DLL for EmailRT
|
| | embeddedmodesvcapi.dll | 6.2.10240.16384 | Embedded Mode Service Client DLL
|
| | encapi.dll | 6.2.10240.16384 | Encoder API
|
| | encdec.dll | 6.2.10240.16384 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 6.2.10240.16384 | EQoS Snapin extension
|
| | errordetails.dll | 6.2.10240.16384 | Microsoft Windows operating system.
|
| | es.dll | 2001.12.10941.16384 | COM+
|
| | esdsip.dll | 6.2.10240.16384 | Crypto SIP provider for signing and verifying .esd Electronic Software Distribution files
|
| | esent.dll | 6.2.10240.16384 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 6.2.10240.16384 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | esevss.dll | 6.2.10240.16384 | Microsoft(R) ESENT shadow utilities
|
| | etwcoreuicomponentsresources.dll | 6.2.10240.16384 | Microsoft CoreComponents UI ETW manifest Dll
|
| | etweseproviderresources.dll | 6.2.10240.16384 | Microsoft ESE ETW
|
| | eventcls.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 6.2.10240.16384 | Enhanced Video Renderer DLL
|
| | execmodelclient.dll | 6.2.10240.16384 | ExecModelClient
|
| | execmodelproxy.dll | 6.2.10240.16384 | ExecModelProxy
|
| | explorerframe.dll | 6.2.10240.16405 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | exsmime.dll | 6.2.10240.16384 | LExsmime
|
| | extrasxmlparser.dll | 6.2.10240.16384 | Extras XML parser used to extract extension information from XML
|
| | f3ahvoas.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | familysafetyext.dll | 6.2.10240.16384 | FamilySafety ChildAccount Extensions
|
| | faultrep.dll | 6.2.10240.16384 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 6.2.10240.16384 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 6.2.10240.16384 | Bluetooth Provider Proxy Dll
|
| | fddevquery.dll | 6.2.10240.16384 | Microsoft Windows Device Query Helper
|
| | fde.dll | 6.2.10240.16384 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 6.2.10240.16384 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 6.2.10240.16384 | Pnp Provider Dll
|
| | fdprint.dll | 6.2.10240.16384 | Function Discovery Print Provider Dll
|
| | fdproxy.dll | 6.2.10240.16384 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 6.2.10240.16384 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 6.2.10240.16384 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 6.2.10240.16384 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 6.2.10240.16384 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 6.2.10240.16384 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 6.2.10240.16384 | Services and Shared Folders
|
| | findnetprinters.dll | 6.2.10240.16384 | Find Network Printers COM Component
|
| | fingerprintcredential.dll | 6.2.10240.16384 | WinBio Fingerprint Credential
|
| | firewallapi.dll | 6.2.10240.16384 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 6.2.10240.16384 | Windows Firewall Control Panel
|
| | fltlib.dll | 6.2.10240.16384 | Filter Library
|
| | fmifs.dll | 6.2.10240.16384 | FM IFS Utility DLL
|
| | fms.dll | 6.2.10240.16384 | Font Management Services
|
| | fontext.dll | 6.2.10240.16384 | Windows Font Folder
|
| | fontsub.dll | 6.2.10240.16384 | Font Subsetting DLL
|
| | fphc.dll | 6.2.10240.16384 | Filtering Platform Helper Class
|
| | framedyn.dll | 6.2.10240.16384 | WMI SDK Provider Framework
|
| | framedynos.dll | 6.2.10240.16384 | WMI SDK Provider Framework
|
| | frprov.dll | 6.2.10240.16384 | Folder Redirection WMI Provider
|
| | fsutilext.dll | 6.2.10240.16384 | FS Utility Extension DLL
|
| | fundisc.dll | 6.2.10240.16384 | Function Discovery Dll
|
| | fwbase.dll | 6.2.10240.16384 | Firewall Base DLL
|
| | fwcfg.dll | 6.2.10240.16384 | Windows Firewall Configuration Helper
|
| | fwpolicyiomgr.dll | 6.2.10240.16412 | FwPolicyIoMgr DLL
|
| | fwpuclnt.dll | 6.2.10240.16384 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 6.2.10240.16384 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 6.2.10240.16384 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 6.2.10240.16384 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 6.2.10240.16384 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 6.2.10240.16384 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 6.2.10240.16384 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 6.2.10240.16384 | Microsoft Fax Transport Provider
|
| | gameux.dll | 6.2.10240.16384 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gamingtcui.dll | 6.2.10240.16384 | Windows Gaming Internal CallableUI dll
|
| | gcdef.dll | 6.2.10240.16384 | Game Controllers Default Sheets
|
| | gdi32.dll | 6.2.10240.16390 | GDI Client DLL
|
| | gdiplus.dll | 6.2.10240.16384 | Microsoft GDI+
|
| | geocommon.dll | 6.2.10240.16384 | Geocommon
|
| | geolocation.dll | 6.2.10240.16384 | Geolocation Runtime DLL
|
| | geolocatorhelper.dll | 6.2.10240.16384 | GeoLocatorHelper
|
| | getuname.dll | 6.2.10240.16384 | Unicode name Dll for UCE
|
| | glmf32.dll | 6.2.10240.16384 | OpenGL Metafiling DLL
|
| | globcollationhost.dll | 6.2.10240.16384 | GlobCollationHost
|
| | globinputhost.dll | 6.2.10240.16384 | Windows Globalization Extension API for Input
|
| | glu32.dll | 6.2.10240.16384 | OpenGL Utility Library DLL
|
| | gpapi.dll | 6.2.10240.16384 | Group Policy Client API
|
| | gpedit.dll | 6.2.10240.16384 | GPEdit
|
| | gpprnext.dll | 6.2.10240.16384 | Group Policy Printer Extension
|
| | gptext.dll | 6.2.10240.16384 | GPTExt
|
| | hbaapi.dll | 6.2.10240.16384 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 6.2.10240.16384 | Security and Maintenance Providers
|
| | helppaneproxy.dll | 6.2.10240.16384 | Microsoft® Help Proxy
|
| | hevcdecoder.dll | 6.2.10240.16384 | Windows H265 Video Decoder
|
| | hgcpl.dll | 6.2.10240.16384 | HomeGroup Control Panel
|
| | hhsetup.dll | 6.2.10240.16384 | Microsoft® HTML Help
|
| | hid.dll | 6.2.10240.16384 | Hid User Library
|
| | hidserv.dll | 6.2.10240.16384 | Human Interface Device Service
|
| | hlink.dll | 6.2.10240.16384 | Microsoft Office 2000 component
|
| | hmkd.dll | 6.2.10240.16385 | Windows HMAC Key Derivation API
|
| | hnetcfg.dll | 6.2.10240.16384 | Home Networking Configuration Manager
|
| | hnetmon.dll | 6.2.10240.16384 | Home Networking Monitor DLL
|
| | hrtfapo.dll | |
|
| | httpapi.dll | 6.2.10240.16384 | HTTP Protocol Stack API
|
| | htui.dll | 6.2.10240.16384 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 6.2.10240.16384 | Network Policy Server
|
| | iasacct.dll | 6.2.10240.16384 | NPS Accounting Provider
|
| | iasads.dll | 6.2.10240.16384 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 6.2.10240.16384 | NPS Datastore server
|
| | iashlpr.dll | 6.2.10240.16384 | NPS Surrogate Component
|
| | iasmigplugin.dll | 6.2.10240.16384 | NPS Migration DLL
|
| | iasnap.dll | 6.2.10240.16384 | NPS NAP Provider
|
| | iaspolcy.dll | 6.2.10240.16384 | NPS Pipeline
|
| | iasrad.dll | 6.2.10240.16384 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 6.2.10240.16384 | NPS XML Datastore Access
|
| | iassam.dll | 6.2.10240.16384 | NPS NT SAM Provider
|
| | iassdo.dll | 6.2.10240.16384 | NPS SDO Component
|
| | iassvcs.dll | 6.2.10240.16384 | NPS Services Component
|
| | iccvid.dll | 1.10.0.12 | Cinepak® Codec
|
| | icm32.dll | 6.2.10240.16384 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 6.2.10240.16384 | ICMP DLL
|
| | icmui.dll | 6.2.10240.16384 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 6.2.10240.16384 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 6.2.10240.16384 | Internet Gateway Device properties
|
| | idctrls.dll | 6.2.10240.16384 | Identity Controls
|
| | idndl.dll | 6.2.10240.16384 | Downlevel DLL
|
| | idstore.dll | 6.2.10240.16384 | Identity Store
|
| | ieadvpack.dll | 11.0.10240.16384 | ADVPACK
|
| | ieapfltr.dll | 11.0.10240.16384 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.10240.16384 | IEAK branding
|
| | ieetwproxystub.dll | 11.0.10240.16384 | IE ETW Collector Proxy Stub Resources
|
| | ieframe.dll | 11.0.10240.16425 | Internet Browser
|
| | iepeers.dll | 11.0.10240.16384 | Internet Explorer Peer Objects
|
| | ieproxy.dll | 11.0.10240.16386 | IE ActiveX Interface Marshaling Library
|
| | iernonce.dll | 11.0.10240.16384 | Extended RunOnce processing with UI
|
| | iertutil.dll | 11.0.10240.16431 | Run time utility for Internet Explorer
|
| | iesetup.dll | 11.0.10240.16384 | IOD Version Map
|
| | iesysprep.dll | 11.0.10240.16384 | IE Sysprep Provider
|
| | ieui.dll | 11.0.10240.16384 | Internet Explorer UI Engine
|
| | ifmon.dll | 6.2.10240.16384 | IF Monitor DLL
|
| | ifsutil.dll | 6.2.10240.16384 | IFS Utility DLL
|
| | ifsutilx.dll | 6.2.10240.16384 | IFS Utility Extension DLL
|
| | ig8icd32.dll | 10.18.15.4256 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | igc32.dll | 10.18.15.4256 | Intel Graphics Shader Compiler for Intel(R) Graphics Accelerator
|
| | igd10idpp32.dll | 10.18.15.4256 | User Mode DPP Driver for Intel(R) Graphics Technology
|
| | igd10iumd32.dll | 10.18.15.4256 | User Mode Driver for Intel(R) Graphics Technology
|
| | igd11dxva32.dll | 10.18.15.4256 | User Mode Driver for Intel(R) Graphics Technology
|
| | igd12umd32.dll | 10.18.15.4256 | User Mode Driver for Intel(R) Graphics Technology
|
| | igdail32.dll | 10.18.15.4256 | Application Settings for Intel(R) Graphics Technology
|
| | igdbcl32.dll | 10.18.15.4256 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdde32.dll | 10.18.15.4256 | User Mode Driver for Intel(R) Graphics Technology
|
| | igdfcl32.dll | 10.18.15.4256 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdmcl32.dll | 10.18.15.4256 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdmd32.dll | 10.18.15.4256 | Metrics Discovery API for Intel(R) Graphics Accelerator
|
| | igdrcl32.dll | 10.18.15.4256 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdumdim32.dll | 10.18.15.4256 | User Mode Driver for Intel(R) Graphics Technology
|
| | igdusc32.dll | 10.18.15.4256 | Unified Shader Compiler for Intel(R) Graphics Accelerator
|
| | igfx11cmrt32.dll | 5.0.0.1084 | MDF(CM) Runtime DX11 Dynamic Link Library
|
| | igfxcmjit32.dll | 5.0.0.1084 | MDF(CM) JIT Dynamic Link Library
|
| | igfxcmrt32.dll | 5.0.0.1084 | MDF(CM) Runtime Dynamic Link Library
|
| | igfxexps32.dll | 6.15.10.4256 | igfxext Module
|
| | iglhcp32.dll | 3.0.1.26 | iglhcp32 Dynamic Link Library
|
| | iglhsip32.dll | 9.0.30.9000 | iglhsip32 Dynamic Link Library
|
| | imagehlp.dll | 6.2.10240.16384 | Windows NT Image Helper
|
| | imageres.dll | 6.2.10240.16384 | Windows Image Resource
|
| | imagesp1.dll | 6.2.10240.16384 | Windows SP1 Image Resource
|
| | imapi.dll | 6.2.10240.16384 | Image Mastering API
|
| | imapi2.dll | 6.2.10240.16384 | Image Mastering API v2
|
| | imapi2fs.dll | 6.2.10240.16384 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 11.0.10240.16384 | IE plugin image decoder support DLL
|
| | imm32.dll | 6.2.10240.16384 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 6.2.10240.16384 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 6.2.10240.16384 | Microsoft MIB-II subagent
|
| | inetres.dll | 6.2.10240.16384 | Microsoft Internet Messaging API Resources
|
| | inkanalysis.dll | 6.2.10240.16384 | InkAnalysis DLL
|
| | inked.dll | 6.2.10240.16384 | Microsoft Tablet PC InkEdit Control
|
| | inkobjcore.dll | 6.2.10240.16384 | Microsoft Tablet PC Ink Platform Component
|
| | input.dll | 6.2.10240.16384 | InputSetting DLL
|
| | inputinjectionbroker.dll | 6.2.10240.16384 | Broker for WinRT input injection.
|
| | inputlocalemanager.dll | |
|
| | inputservice.dll | |
|
| | inputswitch.dll | 6.2.10240.16384 | Microsoft Windows Input Switcher
|
| | inseng.dll | 11.0.10240.16384 | Install engine
|
| | intel_opencl_icd32.dll | 2.0.2.0 | OpenCL Client DLL
|
| | intelcameraplugin.dll | 1.0.0.1 | Intel(R) Camera MFT
|
| | intelopencl32.dll | 10.18.15.4256 | Intel(R) OpenCL(TM) Common Runtime Driver
|
| | intelsocyuvcopy.dll | 1.0.0.1 | Intel(R) SoC YUV Copy Filter
|
| | iologmsg.dll | 6.2.10240.16384 | IO Logging DLL
|
| | iotassignedaccesslockframework.dll | 6.2.10240.16384 | Windows Runtime Assigned Access Management DLL
|
| | ipeloggingdictationhelper.dll | 1.0.0.1 | IPE Logging Library Helper
|
| | iphlpapi.dll | 6.2.10240.16384 | IP Helper API
|
| | iprop.dll | 6.2.10240.16384 | OLE PropertySet Implementation
|
| | iprtprio.dll | 6.2.10240.16384 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 6.2.10240.16384 | IP Router Manager
|
| | ipsecsnp.dll | 6.2.10240.16384 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 6.2.10240.16384 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 6.2.10240.16384 | IR32_32 WRAPPER DLL
|
| | ir32_32original.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_32original.dll | 4.51.16.3 | Intel Indeo® Video 4.5
|
| | ir41_qc.dll | 6.2.10240.16384 | IR41_QC WRAPPER DLL
|
| | ir41_qcoriginal.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 6.2.10240.16384 | IR41_QCX WRAPPER DLL
|
| | ir41_qcxoriginal.dll | 4.30.64.1 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 6.2.10240.16384 | IR50_32 WRAPPER DLL
|
| | ir50_32original.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 6.2.10240.16384 | IR50_QC WRAPPER DLL
|
| | ir50_qcoriginal.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 6.2.10240.16384 | IR50_QCX WRAPPER DLL
|
| | ir50_qcxoriginal.dll | 5.0.64.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 6.2.10240.16384 | Infrared Class Coinstaller
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 6.2.10240.16384 | iSCSI Discovery api
|
| | iscsied.dll | 6.2.10240.16384 | iSCSI Extension DLL
|
| | iscsium.dll | 6.2.10240.16384 | iSCSI Discovery api
|
| | iscsiwmi.dll | 6.2.10240.16384 | MS iSCSI Initiator WMI Provider
|
| | iscsiwmiv2.dll | 6.2.10240.16384 | WMI Provider for iSCSI
|
| | itircl.dll | 6.2.10240.16384 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 6.2.10240.16384 | Microsoft® InfoTech Storage System Library
|
| | iuseventlog.dll | 1.42.17.0 | Intel(R) TCS Event Log messages definitions
|
| | iyuv_32.dll | 6.2.10240.16384 | Intel Indeo(R) Video YUV Codec
|
| | javascriptcollectionagent.dll | 11.0.10240.16384 | JavaScript Performance Collection Agent
|
| | joinproviderol.dll | 6.2.10240.16384 | Online Join Provider DLL
|
| | joinutil.dll | 6.2.10240.16384 | Join Utility DLL
|
| | jpmapcontrol.dll | 6.2.10240.16384 | Jupiter Map Control
|
| | jscript.dll | 5.812.10240.16384 | Microsoft ® JScript
|
| | jscript9.dll | 11.0.10240.16386 | Microsoft ® JScript
|
| | jscript9diag.dll | 11.0.10240.16384 | Microsoft ® JScript Diagnostics
|
| | jsproxy.dll | 11.0.10240.16384 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 6.2.10240.16384 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 6.2.10240.16384 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 6.2.10240.16384 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 6.2.10240.16384 | Albania Keyboard Layout
|
| | kbdarme.dll | 6.2.10240.16384 | Eastern Armenian Keyboard Layout
|
| | kbdarmph.dll | 6.2.10240.16384 | Armenian Phonetic Keyboard Layout
|
| | kbdarmty.dll | 6.2.10240.16384 | Armenian Typewriter Keyboard Layout
|
| | kbdarmw.dll | 6.2.10240.16384 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 6.2.10240.16384 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 6.2.10240.16384 | Azeri-Latin Keyboard Layout
|
| | kbdazst.dll | 6.2.10240.16384 | Azerbaijani (Standard) Keyboard Layout
|
| | kbdbash.dll | 6.2.10240.16384 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 6.2.10240.16384 | Belgian Keyboard Layout
|
| | kbdbene.dll | 6.2.10240.16384 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 6.2.10240.16384 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 6.2.10240.16384 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 6.2.10240.16384 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 6.2.10240.16384 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 6.2.10240.16384 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 6.2.10240.16384 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbug.dll | 6.2.10240.16384 | Buginese Keyboard Layout
|
| | kbdbulg.dll | 6.2.10240.16384 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 6.2.10240.16384 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 6.2.10240.16384 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcher.dll | 6.2.10240.16384 | Cherokee Nation Keyboard Layout
|
| | kbdcherp.dll | 6.2.10240.16384 | Cherokee Phonetic Keyboard Layout
|
| | kbdcr.dll | 6.2.10240.16384 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 6.2.10240.16384 | Czech Keyboard Layout
|
| | kbdcz1.dll | 6.2.10240.16384 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 6.2.10240.16384 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 6.2.10240.16384 | Danish Keyboard Layout
|
| | kbddiv1.dll | 6.2.10240.16384 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 6.2.10240.16384 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 6.2.10240.16384 | Dvorak US English Keyboard Layout
|
| | kbddzo.dll | 6.2.10240.16384 | Dzongkha Keyboard Layout
|
| | kbdes.dll | 6.2.10240.16384 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 6.2.10240.16384 | Estonia Keyboard Layout
|
| | kbdfa.dll | 6.2.10240.16384 | Persian Keyboard Layout
|
| | kbdfar.dll | 6.2.10240.16384 | Persian Standard Keyboard Layout
|
| | kbdfc.dll | 6.2.10240.16384 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 6.2.10240.16384 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 6.2.10240.16384 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 6.2.10240.16384 | Færoese Keyboard Layout
|
| | kbdfr.dll | 6.2.10240.16384 | French Keyboard Layout
|
| | kbdfthrk.dll | 6.2.10240.16384 | Futhark Keyboard Layout
|
| | kbdgae.dll | 6.2.10240.16384 | Scottish Gaelic (United Kingdom) Keyboard Layout
|
| | kbdgeo.dll | 6.2.10240.16384 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 6.2.10240.16384 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeome.dll | 6.2.10240.16384 | Georgian (MES) Keyboard Layout
|
| | kbdgeooa.dll | 6.2.10240.16384 | Georgian (Old Alphabets) Keyboard Layout
|
| | kbdgeoqw.dll | 6.2.10240.16384 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 6.2.10240.16384 | Greek_Latin Keyboard Layout
|
| | kbdgn.dll | 6.2.10240.16384 | Guarani Keyboard Layout
|
| | kbdgr.dll | 6.2.10240.16384 | German Keyboard Layout
|
| | kbdgr1.dll | 6.2.10240.16384 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 6.2.10240.16384 | Greenlandic Keyboard Layout
|
| | kbdgthc.dll | 6.2.10240.16384 | Gothic Keyboard Layout
|
| | kbdhau.dll | 6.2.10240.16384 | Hausa Keyboard Layout
|
| | kbdhaw.dll | 6.2.10240.16384 | Hawaiian Keyboard Layout
|
| | kbdhe.dll | 6.2.10240.16384 | Greek Keyboard Layout
|
| | kbdhe220.dll | 6.2.10240.16384 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 6.2.10240.16384 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 6.2.10240.16384 | KBDHEB Keyboard Layout
|
| | kbdhebl3.dll | 6.2.10240.16384 | Hebrew Standard Keyboard Layout
|
| | kbdhela2.dll | 6.2.10240.16384 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 6.2.10240.16384 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 6.2.10240.16384 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 6.2.10240.16384 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 6.2.10240.16384 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 6.2.10240.16384 | Igbo Keyboard Layout
|
| | kbdic.dll | 6.2.10240.16384 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 6.2.10240.16384 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 6.2.10240.16384 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 6.2.10240.16384 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 6.2.10240.16384 | Bengali Keyboard Layout
|
| | kbdindev.dll | 6.2.10240.16384 | Devanagari Keyboard Layout
|
| | kbdinen.dll | 6.2.10240.16384 | English (India) Keyboard Layout
|
| | kbdinguj.dll | 6.2.10240.16384 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 6.2.10240.16384 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 6.2.10240.16384 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 6.2.10240.16384 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 6.2.10240.16384 | Marathi Keyboard Layout
|
| | kbdinori.dll | 6.2.10240.16384 | Odia Keyboard Layout
|
| | kbdinpun.dll | 6.2.10240.16384 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 6.2.10240.16384 | Tamil Keyboard Layout
|
| | kbdintel.dll | 6.2.10240.16384 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 6.2.10240.16384 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 6.2.10240.16384 | Irish Keyboard Layout
|
| | kbdit.dll | 6.2.10240.16384 | Italian Keyboard Layout
|
| | kbdit142.dll | 6.2.10240.16384 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 6.2.10240.16384 | Inuktitut Latin Keyboard Layout
|
| | kbdjav.dll | 6.2.10240.16384 | Javanese Keyboard Layout
|
| | kbdjpn.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 6.2.10240.16384 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 6.2.10240.16384 | Cambodian Standard Keyboard Layout
|
| | kbdkni.dll | 6.2.10240.16384 | Khmer (NIDA) Keyboard Layout
|
| | kbdkor.dll | 6.2.10240.16384 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkurd.dll | 6.2.10240.16384 | Central Kurdish Keyboard Layout
|
| | kbdkyr.dll | 6.2.10240.16384 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 6.2.10240.16384 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 6.2.10240.16384 | Lao Standard Keyboard Layout
|
| | kbdlisub.dll | 6.2.10240.16384 | Lisu Basic Keyboard Layout
|
| | kbdlisus.dll | 6.2.10240.16384 | Lisu Standard Keyboard Layout
|
| | kbdlk41a.dll | 6.2.10240.16384 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 6.2.10240.16384 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 6.2.10240.16384 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 6.2.10240.16384 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 6.2.10240.16384 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 6.2.10240.16384 | Latvia-QWERTY Keyboard Layout
|
| | kbdlvst.dll | 6.2.10240.16384 | Latvian (Standard) Keyboard Layout
|
| | kbdmac.dll | 6.2.10240.16384 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 6.2.10240.16384 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 6.2.10240.16384 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 6.2.10240.16384 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 6.2.10240.16384 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 6.2.10240.16384 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 6.2.10240.16384 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdmonst.dll | 6.2.10240.16384 | Traditional Mongolian (Standard) Keyboard Layout
|
| | kbdmyan.dll | 6.2.10240.16384 | Myanmar Keyboard Layout
|
| | kbdne.dll | 6.2.10240.16384 | Dutch Keyboard Layout
|
| | kbdnec.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 6.2.10240.16384 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 6.2.10240.16384 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 6.2.10240.16384 | Nepali Keyboard Layout
|
| | kbdnko.dll | 6.2.10240.16384 | N'Ko Keyboard Layout
|
| | kbdno.dll | 6.2.10240.16384 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 6.2.10240.16384 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 6.2.10240.16384 | Sesotho sa Leboa Keyboard Layout
|
| | kbdntl.dll | 6.2.10240.16384 | New Tai Leu Keyboard Layout
|
| | kbdogham.dll | 6.2.10240.16384 | Ogham Keyboard Layout
|
| | kbdolch.dll | 6.2.10240.16384 | Ol Chiki Keyboard Layout
|
| | kbdoldit.dll | 6.2.10240.16384 | Old Italic Keyboard Layout
|
| | kbdosm.dll | 6.2.10240.16384 | Osmanya Keyboard Layout
|
| | kbdpash.dll | 6.2.10240.16384 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdphags.dll | 6.2.10240.16384 | Phags-pa Keyboard Layout
|
| | kbdpl.dll | 6.2.10240.16384 | Polish Keyboard Layout
|
| | kbdpl1.dll | 6.2.10240.16384 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 6.2.10240.16384 | Portuguese Keyboard Layout
|
| | kbdro.dll | 6.2.10240.16384 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 6.2.10240.16384 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 6.2.10240.16384 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 6.2.10240.16384 | Russian Keyboard Layout
|
| | kbdru1.dll | 6.2.10240.16384 | Russia(Typewriter) Keyboard Layout
|
| | kbdrum.dll | 6.2.10240.16384 | Russian - Mnemonic Keyboard Layout
|
| | kbdsf.dll | 6.2.10240.16384 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 6.2.10240.16384 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 6.2.10240.16384 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 6.2.10240.16384 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 6.2.10240.16384 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 6.2.10240.16384 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 6.2.10240.16384 | Sinhala Keyboard Layout
|
| | kbdsora.dll | 6.2.10240.16384 | Sora Keyboard Layout
|
| | kbdsorex.dll | 6.2.10240.16384 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 6.2.10240.16384 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 6.2.10240.16384 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 6.2.10240.16384 | Spanish Keyboard Layout
|
| | kbdsw.dll | 6.2.10240.16384 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 6.2.10240.16384 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 6.2.10240.16384 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 6.2.10240.16384 | Syriac Phoenetic Keyboard Layout
|
| | kbdtaile.dll | 6.2.10240.16384 | Tai Le Keyboard Layout
|
| | kbdtajik.dll | 6.2.10240.16384 | Tajik Keyboard Layout
|
| | kbdtat.dll | 6.2.10240.16384 | Tatar (Legacy) Keyboard Layout
|
| | kbdth0.dll | 6.2.10240.16384 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 6.2.10240.16384 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 6.2.10240.16384 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 6.2.10240.16384 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtifi.dll | 6.2.10240.16384 | Tifinagh (Basic) Keyboard Layout
|
| | kbdtifi2.dll | 6.2.10240.16384 | Tifinagh (Extended) Keyboard Layout
|
| | kbdtiprc.dll | 6.2.10240.16384 | Tibetan (PRC) Keyboard Layout
|
| | kbdtiprd.dll | 6.2.10240.16384 | Tibetan (PRC) - Updated Keyboard Layout
|
| | kbdtt102.dll | 6.2.10240.16384 | Tatar Keyboard Layout
|
| | kbdtuf.dll | 6.2.10240.16384 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 6.2.10240.16384 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 6.2.10240.16384 | Turkmen Keyboard Layout
|
| | kbdtzm.dll | 6.2.10240.16384 | Central Atlas Tamazight Keyboard Layout
|
| | kbdughr.dll | 6.2.10240.16384 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 6.2.10240.16384 | Uyghur Keyboard Layout
|
| | kbduk.dll | 6.2.10240.16384 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 6.2.10240.16384 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 6.2.10240.16384 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 6.2.10240.16384 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 6.2.10240.16384 | Urdu Keyboard Layout
|
| | kbdus.dll | 6.2.10240.16384 | United States Keyboard Layout
|
| | kbdusa.dll | 6.2.10240.16384 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 6.2.10240.16384 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 6.2.10240.16384 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 6.2.10240.16384 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 6.2.10240.16384 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 6.2.10240.16384 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 6.2.10240.16384 | Wolof Keyboard Layout
|
| | kbdyak.dll | 6.2.10240.16384 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 6.2.10240.16384 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 6.2.10240.16384 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 6.2.10240.16384 | Serbian (Latin) Keyboard Layout
|
| | kerbclientshared.dll | 6.2.10240.16384 | Kerberos Client Shared Functionality
|
| | kerberos.dll | 6.2.10240.16384 | Kerberos Security Package
|
| | kernel.appcore.dll | 6.2.10240.16384 | AppModel API Host
|
| | kernel32.dll | 6.2.10240.16384 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 6.2.10240.16384 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 6.2.10240.16384 | CNG Key Isolation Service
|
| | keymgr.dll | 6.2.10240.16384 | Stored User Names and Passwords
|
| | ksuser.dll | 6.2.10240.16384 | User CSA Library
|
| | ktmw32.dll | 6.2.10240.16384 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 6.2.10240.16384 | Policy Storage dll
|
| | l2nacp.dll | 6.2.10240.16384 | Windows Onex Credential Provider
|
| | l2sechc.dll | 6.2.10240.16384 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.10240.16384 | Windows Media Logagent Proxy
|
| | lfsvc.dll | 6.2.10240.16384 | Geolocation Service
|
| | libia_cp.dll | |
|
| | licensemanager.dll | 6.2.10240.16412 | LicenseManager
|
| | licmgr10.dll | 11.0.10240.16384 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 6.2.10240.16384 | Windows Volume Tracking
|
| | loadperf.dll | 6.2.10240.16384 | Load & Unload Performance Counters
|
| | localsec.dll | 6.2.10240.16384 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 6.2.10240.16384 | Microsoft Windows Location API
|
| | locationframework.dll | 6.2.10240.16384 | Windows Geolocation Framework
|
| | locationframeworkinternalps.dll | 6.2.10240.16384 | Windows Geolocation Framework Internal PS
|
| | locationframeworkps.dll | 6.2.10240.16384 | Windows Geolocation Framework PS
|
| | lockappbroker.dll | 6.2.10240.16425 | Windows Lock App Broker DLL
|
| | loghours.dll | 6.2.10240.16384 | Schedule Dialog
|
| | logoncli.dll | 6.2.10240.16384 | Net Logon Client DLL
|
| | logoncontroller.dll | 6.2.10240.16425 | Logon UX Controller
|
| | lpk.dll | 6.2.10240.16384 | Language Pack
|
| | lsmproxy.dll | 6.2.10240.16384 | LSM interfaces proxy Dll
|
| | luainstall.dll | 6.2.10240.16384 | Lua manifest install
|
| | lz32.dll | 6.2.10240.16384 | LZ Expand/Compress API DLL
|
| | magnification.dll | 6.2.10240.16384 | Microsoft Magnification API
|
| | mapconfiguration.dll | 6.2.10240.16392 | MapConfiguration
|
| | mapcontrolcore.dll | 6.2.10240.16384 | Map Control Core
|
| | mapcontrolstringsres.dll | 6.2.10240.16384 | Map control resource strings
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapsbtsvc.dll | 6.2.10240.16384 | Maps Background Transfer Service
|
| | mbaeapi.dll | 6.2.10240.16431 | Mobile Broadband Account Experience API
|
| | mbaeapipublic.dll | 6.2.10240.16431 | Mobile Broadband Account API
|
| | mbsmsapi.dll | 6.2.10240.16384 | Microsoft Windows Mobile Broadband SMS API
|
| | mbussdapi.dll | 6.2.10240.16384 | Microsoft Windows Mobile Broadband USSD API
|
| | mcewmdrmndbootstrap.dll | 1.3.2310.10 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 6.2.10240.16384 | Video For Windows MCI driver
|
| | mcicda.dll | 6.2.10240.16384 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 6.2.10240.16384 | DirectShow MCI Driver
|
| | mciseq.dll | 6.2.10240.16384 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 6.2.10240.16384 | MCI driver for waveform audio
|
| | mcrecvsrc.dll | 12.0.10240.16385 | Miracast Media Foundation Source DLL
|
| | mdminst.dll | 6.2.10240.16384 | Modem Class Installer
|
| | mdmregistration.dll | 6.2.10240.16384 | MDM Registration DLL
|
| | messagingdatamodel2.dll | 6.2.10240.16394 | MessagingDataModel2
|
| | mf.dll | 12.0.10240.16384 | Media Foundation DLL
|
| | mf3216.dll | 6.2.10240.16384 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 6.2.10240.16384 | Media Foundation AAC Encoder
|
| | mfasfsrcsnk.dll | 12.0.10240.16384 | Media Foundation ASF Source and Sink DLL
|
| | mfc100.dll | 10.0.40219.1 | MFCDLL Shared Library - Retail Version
|
| | mfc100u.dll | 10.0.40219.1 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6140 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8063.0 | MFCDLL Shared Library - Retail Version
|
| | mfcaptureengine.dll | 12.0.10240.16384 | Media Foundation CaptureEngine DLL
|
| | mfcm100.dll | 10.0.40219.1 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.1 | MFC Managed Library - Retail Version
|
| | mfcore.dll | 12.0.10240.16431 | Media Foundation Core DLL
|
| | mfcsubs.dll | 2001.12.10941.16384 | COM+
|
| | mfds.dll | 12.0.10240.16384 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 6.2.10240.16384 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.10240.16384 | Media Foundation Error DLL
|
| | mfh263enc.dll | 6.2.10240.16384 | Media Foundation h263 Encoder
|
| | mfh264enc.dll | 6.2.10240.16384 | Media Foundation H264 Encoder
|
| | mfh265enc.dll | 6.2.10240.16384 | Media Foundation H265 Encoder
|
| | mfmediaengine.dll | 6.2.10240.16431 | Media Foundation Media Engine DLL
|
| | mfmjpegdec.dll | 6.2.10240.16384 | Media Foundation MJPEG Decoder
|
| | mfmkvsrcsnk.dll | 6.2.10240.16412 | Media Foundation MKV Media Source and Sink DLL
|
| | mfmp4srcsnk.dll | 12.0.10240.16412 | Media Foundation MPEG4 Source and Sink DLL
|
| | mfmpeg2srcsnk.dll | 12.0.10240.16412 | Media Foundation MPEG2 Source and Sink DLL
|
| | mfnetcore.dll | 12.0.10240.16384 | Media Foundation Net Core DLL
|
| | mfnetsrc.dll | 12.0.10240.16384 | Media Foundation Net Source DLL
|
| | mfperfhelper.dll | 12.0.10240.16384 | MFPerf DLL
|
| | mfplat.dll | 12.0.10240.16431 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.10240.16412 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.10240.16384 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.10240.16384 | Media Foundation ReadWrite DLL
|
| | mfsrcsnk.dll | 12.0.10240.16412 | Media Foundation Source and Sink DLL
|
| | mfsvr.dll | 6.2.10240.16427 | Media Foundation Simple Video Renderer DLL
|
| | mftranscode.dll | 12.0.10240.16384 | Media Foundation Transcode DLL
|
| | mfvdsp.dll | 6.2.10240.16384 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 6.2.10240.16384 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 6.2.10240.16384 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | mi.dll | 6.2.10240.16384 | Management Infrastructure
|
| | mibincodec.dll | 6.2.10240.16384 | Management Infrastructure binary codec component
|
| | microsoft.management.infrastructure.native.unmanaged.dll | 6.2.10240.16384 | Microsoft.Management.Infrastructure.Native.Unmanaged.dll
|
| | microsoftaccountextension.dll | 6.2.10240.16384 | Microsoft Account Extension DLL
|
| | microsoftaccounttokenprovider.dll | 6.2.10240.16384 | Microsoft® Account Token Provider
|
| | microsoft-windows-mapcontrols.dll | 6.2.10240.16384 | Map Event Resources
|
| | microsoft-windows-moshost.dll | 6.2.10240.16384 | MosHost Event Resources
|
| | microsoft-windows-mostrace.dll | 6.2.10240.16384 | MOS Event Resources
|
| | midimap.dll | 6.2.10240.16384 | Microsoft MIDI Mapper
|
| | migisol.dll | 6.2.10240.16384 | Migration System Isolation Layer
|
| | miguiresource.dll | 6.2.10240.16384 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.10240.16384 | MIME Filter
|
| | mimofcodec.dll | 6.2.10240.16384 | Management Infrastructure mof codec component
|
| | minstoreevents.dll | 6.2.10240.16384 | Minstore Event Resource
|
| | miracastreceiver.dll | 12.0.10240.16384 | Miracast Receiver API
|
| | mirrordrvcompat.dll | 6.2.10240.16384 | Mirror Driver Compatibility Helper
|
| | mispace.dll | 6.2.10240.16384 | Storage Management Provider for Spaces
|
| | miutils.dll | 6.2.10240.16384 | Management Infrastructure
|
| | mlang.dll | 6.2.10240.16384 | Multi Language Support DLL
|
| | mmcbase.dll | 6.2.10240.16384 | MMC Base DLL
|
| | mmci.dll | 6.2.10240.16384 | Media class installer
|
| | mmcico.dll | 6.2.10240.16384 | Media class co-installer
|
| | mmcndmgr.dll | 6.2.10240.16384 | MMC Node Manager DLL
|
| | mmcshext.dll | 6.2.10240.16384 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 6.2.10240.16384 | MMDevice API
|
| | mmres.dll | 6.2.10240.16384 | General Audio Resources
|
| | modemui.dll | 6.2.10240.16384 | Windows Modem Properties
|
| | moricons.dll | 6.2.10240.16384 | Windows NT Setup Icon Resources Library
|
| | mos.dll | 6.2.10240.16392 | mos
|
| | moshostclient.dll | 6.2.10240.16384 | MosHostClient
|
| | mp3dmod.dll | 6.2.10240.16384 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 6.2.10240.16384 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 6.2.10240.16384 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 6.2.10240.16384 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 6.2.10240.16384 | Multiple Provider Router DLL
|
| | mprapi.dll | 6.2.10240.16384 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 6.2.10240.16384 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 6.2.10240.16384 | Dynamic Interface Manager
|
| | mprext.dll | 6.2.10240.16384 | Multiple Provider Router Extension DLL
|
| | mprmsg.dll | 6.2.10240.16384 | Multi-Protocol Router Service Messages DLL
|
| | mrmcorer.dll | 6.2.10240.16385 | Microsoft Windows MRM
|
| | mrmindexer.dll | 6.2.10240.16384 | Microsoft Windows MRM
|
| | mrt_map.dll | 1.0.22929.0 | Microsoft .NET Native Error Reporting Helper
|
| | mrt100.dll | 1.0.22929.0 | Microsoft .NET Native Runtime
|
| | ms3dthumbnailprovider.dll | 6.2.10240.16384 | 3MF Metadata Handler
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 6.2.10240.16384 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 6.2.10240.16384 | Microsoft ACM Audio Filter
|
| | msadce.dll | 6.2.10240.16384 | OLE DB Cursor Engine
|
| | msadcer.dll | 6.2.10240.16384 | OLE DB Cursor Engine Resources
|
| | msadco.dll | 6.2.10240.16384 | Remote Data Services Data Control
|
| | msadcor.dll | 6.2.10240.16384 | Remote Data Services Data Control Resources
|
| | msadds.dll | 6.2.10240.16384 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 6.2.10240.16384 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 6.2.10240.16384 | ActiveX Data Objects Resources
|
| | msado15.dll | 6.2.10240.16384 | ActiveX Data Objects
|
| | msadomd.dll | 6.2.10240.16384 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 6.2.10240.16384 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 6.2.10240.16384 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 6.2.10240.16384 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 6.2.10240.16384 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msajapi.dll | 6.2.10240.16384 | AllJoyn API Library
|
| | msalacdecoder.dll | 6.2.10240.16384 | Media Foundation ALAC Decoder
|
| | msalacencoder.dll | 6.2.10240.16384 | Media Foundation ALAC Encoder
|
| | msamrnbdecoder.dll | 6.2.10240.16384 | AMR Narrowband Decoder DLL
|
| | msamrnbencoder.dll | 6.2.10240.16384 | AMR Narrowband Encoder DLL
|
| | msamrnbsink.dll | 6.2.10240.16384 | AMR Narrowband Sink DLL
|
| | msamrnbsource.dll | 6.2.10240.16384 | AMR Narrowband Source DLL
|
| | msasn1.dll | 6.2.10240.16384 | ASN.1 Runtime APIs
|
| | msauddecmft.dll | 6.2.10240.16384 | Media Foundation Audio Decoders
|
| | msaudite.dll | 6.2.10240.16384 | Security Audit Events DLL
|
| | msauserext.dll | 6.2.10240.16384 | MSA USER Extension DLL
|
| | mscandui.dll | 6.2.10240.16384 | MSCANDUI Server DLL
|
| | mscat32.dll | 6.2.10240.16384 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 10.0.10240.16384 | Microsoft Class Mini-driver
|
| | mscms.dll | 6.2.10240.16384 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 6.2.10240.16384 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 6.2.10240.16384 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.8662 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 6.2.10240.16384 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 6.2.10240.16384 | ODBC Code Page Translator
|
| | msctf.dll | 6.2.10240.16384 | MSCTF Server DLL
|
| | msctfmonitor.dll | 6.2.10240.16384 | MsCtfMonitor DLL
|
| | msctfp.dll | 6.2.10240.16384 | MSCTFP Server DLL
|
| | msctfui.dll | 6.2.10240.16384 | MSCTFUI Server DLL
|
| | msctfuimanager.dll | 6.2.10240.16425 | Microsoft UIManager DLL
|
| | msdadc.dll | 6.2.10240.16384 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 6.2.10240.16384 | Built-In Diagnostics
|
| | msdaenum.dll | 6.2.10240.16384 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 6.2.10240.16384 | OLE DB Error Collection Stub
|
| | msdaora.dll | 6.2.10240.16384 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 6.2.10240.16384 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 6.2.10240.16384 | OLE DB Simple Provider
|
| | msdaprsr.dll | 6.2.10240.16384 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 6.2.10240.16384 | OLE DB Persistence Services
|
| | msdaps.dll | 6.2.10240.16384 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 6.2.10240.16384 | OLE DB Remote Provider
|
| | msdaremr.dll | 6.2.10240.16384 | OLE DB Remote Provider Resources
|
| | msdart.dll | 6.2.10240.16384 | OLE DB Runtime Routines
|
| | msdasc.dll | 6.2.10240.16384 | OLE DB Service Components Stub
|
| | msdasql.dll | 6.2.10240.16384 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 6.2.10240.16384 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 6.2.10240.16384 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 6.2.10240.16384 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 6.2.10240.16384 | OLE DB RootBinder Stub
|
| | msdelta.dll | 6.2.10240.16384 | Microsoft Patch Engine
|
| | msdfmap.dll | 6.2.10240.16384 | Data Factory Handler
|
| | msdmo.dll | 6.2.10240.16384 | DMO Runtime
|
| | msdrm.dll | 6.2.10240.16384 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl40.dll | 4.0.9756.0 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 11.0.10240.16384 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 11.0.10240.16384 | Microsoft Feeds Background Sync
|
| | msflacdecoder.dll | 6.2.10240.16384 | Media Foundation FLAC Decoder
|
| | msflacencoder.dll | 6.2.10240.16384 | Media Foundation FLAC Encoder
|
| | msftedit.dll | 6.2.10240.16386 | Rich Text Edit Control, v7.5
|
| | mshtml.dll | 11.0.10240.16445 | Microsoft (R) HTML Viewer
|
| | mshtmldac.dll | 11.0.10240.16384 | DAC for Trident DOM
|
| | mshtmled.dll | 11.0.10240.16384 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 11.0.10240.16384 | Microsoft® HTML Editing Component's Resource DLL
|
| | msi.dll | 5.0.10240.16386 | Windows Installer
|
| | msidcrl40.dll | 6.2.10240.16384 | Microsoft® Account Dynamic Link Library
|
| | msident.dll | 6.2.10240.16384 | Microsoft Identity Manager
|
| | msidle.dll | 6.2.10240.16384 | User Idle Monitor
|
| | msidntld.dll | 6.2.10240.16384 | Microsoft Identity Manager
|
| | msieftp.dll | 6.2.10240.16384 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.10240.16384 | Windows® installer
|
| | msiltcfg.dll | 5.0.10240.16384 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 6.2.10240.16384 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.10240.16384 | Windows® Installer International Messages
|
| | msimtf.dll | 6.2.10240.16384 | Active IMM Server DLL
|
| | msisip.dll | 5.0.10240.16384 | MSI Signature SIP Provider
|
| | msiwer.dll | 5.0.10240.16384 | MSI Windows Error Reporting
|
| | msjet40.dll | 4.0.9765.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9756.0 |
|
| | msjint40.dll | 4.0.9765.0 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 6.2.10240.16384 | Jet and Replication Objects
|
| | msjter40.dll | 4.0.9756.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9756.0 | Microsoft Jet Expression Service
|
| | mskeyprotcli.dll | 6.2.10240.16384 | Windows Client Key Protection Provider
|
| | mskeyprotect.dll | 6.2.10240.16384 | Microsoft Key Protection Provider
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus40.dll | 4.0.9756.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmpeg2adec.dll | 12.0.10133.0 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 12.0.10240.16384 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 12.0.10133.0 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.10240.16384 | DRM ActiveX Network Object
|
| | msobjs.dll | 6.2.10240.16384 | System object audit names
|
| | msoeacct.dll | 6.2.10240.16384 | Microsoft Internet Account Manager
|
| | msoert2.dll | 6.2.10240.16384 | Microsoft Windows Mail RT Lib
|
| | msorc32r.dll | 6.2.10240.16384 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 6.2.10240.16384 | ODBC Driver for Oracle
|
| | mspatcha.dll | 6.2.10240.16384 | Microsoft File Patch Application API
|
| | mspatchc.dll | 6.2.10240.16384 | Microsoft Patch Creation Engine
|
| | mspbde40.dll | 4.0.9756.0 | Microsoft Jet Paradox Isam
|
| | msphotography.dll | 6.2.10240.16384 | MS Photography DLL
|
| | msports.dll | 6.2.10240.16384 | Ports Class Installer
|
| | msrating.dll | 11.0.10240.16384 | Internet Ratings and Local User Management DLL
|
| | msrd2x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9756.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 6.2.10240.16384 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 6.2.10240.16384 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl40.dll | 4.0.9756.0 | Microsoft Replication Library
|
| | msrle32.dll | 6.2.10240.16384 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.10240.16384 | PKM Perfmon Counter DLL
|
| | msscp.dll | 11.0.10240.16384 | Windows Media Secure Content Provider
|
| | msshooks.dll | 7.0.10240.16384 | Microsoft Search Hooks
|
| | mssign32.dll | 6.2.10240.16384 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 6.2.10240.16384 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.10240.16384 | mssitlb
|
| | msspellcheckingfacility.dll | 6.2.10240.16384 | Microsoft Spell Checking Facility
|
| | mssph.dll | 7.0.10240.16384 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.10240.16384 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.10240.16384 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.10240.16431 | Microsoft Embedded Search
|
| | mssvp.dll | 7.0.10240.16384 | MSSearch Vista Platform
|
| | mstask.dll | 6.2.10240.16384 | Task Scheduler interface DLL
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 6.2.10240.16384 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 6.2.10240.16384 | MSUTB Server DLL
|
| | msv1_0.dll | 6.2.10240.16384 | Microsoft Authentication Package v1.0
|
| | msvbvm60.dll | 6.0.98.15 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.10240.16384 | Windows NT IOStreams DLL
|
| | msvcp_win.dll | 6.2.10240.16384 | Microsoft® C Runtime Library
|
| | msvcp100.dll | 10.0.40219.1 | Microsoft® C Runtime Library
|
| | msvcp110.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcp110_win.dll | 6.2.10240.16384 | Microsoft® STL110 C++ Runtime Library
|
| | msvcp120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcp120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcp60.dll | 7.0.10240.16384 | Windows NT C++ Runtime Library DLL
|
| | msvcr100.dll | 10.0.40219.1 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 14.0.79.0 | Microsoft® .NET Framework
|
| | msvcr110.dll | 11.0.50727.1 | Microsoft® C Runtime Library
|
| | msvcr120.dll | 12.0.21005.1 | Microsoft® C Runtime Library
|
| | msvcr120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.10240.16384 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 6.2.10240.16384 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 6.2.10240.16384 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 6.2.10240.16384 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.10240.16384 | ActiveX control for streaming video
|
| | msvideodsp.dll | 6.2.10240.16384 | Video Stabilization MFT
|
| | msvproc.dll | 12.0.10240.16384 | Media Foundation Video Processor
|
| | mswb7.dll | 6.2.10240.16384 | MSWB7 DLL
|
| | mswdat10.dll | 4.0.9756.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.10240.16384 | Windows Media Device Manager Core
|
| | mswsock.dll | 6.2.10240.16384 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9765.0 | Microsoft Jet Sort Library
|
| | msxactps.dll | 6.2.10240.16384 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9756.0 | Microsoft Jet xBASE Isam
|
| | msxml3.dll | 8.110.10240.16384 | MSXML 3.0
|
| | msxml3r.dll | 8.110.10240.16384 | XML Resources
|
| | msxml6.dll | 6.30.10240.16384 | MSXML 6.0
|
| | msxml6r.dll | 6.30.10240.16384 | XML Resources
|
| | msyuv.dll | 6.2.10240.16384 | Microsoft UYVY Video Decompressor
|
| | mtf.dll | |
|
| | mtxclu.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.10941.16384 | COM+
|
| | mtxex.dll | 2001.12.10941.16384 | COM+
|
| | mtxlegih.dll | 2001.12.10941.16384 | COM+
|
| | mtxoci.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 6.2.10240.16384 | MUI Callback for font registry settings
|
| | mycomput.dll | 6.2.10240.16384 | Computer Management
|
| | mydocs.dll | 6.2.10240.16384 | My Documents Folder UI
|
| | napcrypt.dll | 6.2.10240.16384 | NAP Cryptographic API helper
|
| | napinsp.dll | 6.2.10240.16384 | E-mail Naming Shim Provider
|
| | naturallanguage6.dll | 6.2.10240.16384 | Natural Language Development Platform 6
|
| | ncaapi.dll | 6.2.10240.16384 | Microsoft Network Connectivity Assistant API
|
| | ncdprop.dll | 6.2.10240.16384 | Advanced network device properties
|
| | nci.dll | 6.2.10240.16384 | CoInstaller: NET
|
| | ncobjapi.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 6.2.10240.16384 | Windows NCrypt Router
|
| | ncryptprov.dll | 6.2.10240.16384 | Microsoft KSP
|
| | ncryptsslp.dll | 6.2.10240.16384 | Microsoft SChannel Provider
|
| | nddeapi.dll | 6.2.10240.16384 | Network DDE Share Management APIs
|
| | ndfapi.dll | 6.2.10240.16384 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 6.2.10240.16384 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 6.2.10240.16384 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 6.2.10240.16384 | NdisCap Notify Object
|
| | ndishc.dll | 6.2.10240.16384 | NDIS Helper Classes
|
| | ndproxystub.dll | 6.2.10240.16384 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 6.2.10240.16384 | NegoExtender Security Package
|
| | netapi32.dll | 6.2.10240.16384 | Net Win32 API DLL
|
| | netbios.dll | 6.2.10240.16384 | NetBIOS Interface Library
|
| | netcenter.dll | 6.2.10240.16384 | Network Center control panel
|
| | netcfgx.dll | 6.2.10240.16384 | Network Configuration Objects
|
| | netcorehc.dll | 6.2.10240.16384 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 6.2.10240.16384 | Network Diagnostic Framework
|
| | netevent.dll | 6.2.10240.16384 | Net Event Handler
|
| | netfxperf.dll | 6.2.10240.16384 | Extensible Performance Counter Shim
|
| | neth.dll | 6.2.10240.16384 | Net Help Messages DLL
|
| | netid.dll | 6.2.10240.16384 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 6.2.10240.16384 | Netio Helper DLL
|
| | netjoin.dll | 6.2.10240.16384 | Domain Join DLL
|
| | netlogon.dll | 6.2.10240.16384 | Net Logon Services DLL
|
| | netmsg.dll | 6.2.10240.16384 | Net Messages DLL
|
| | netplwiz.dll | 6.2.10240.16384 | Map Network Drives/Network Places Wizard
|
| | netprofm.dll | 6.2.10240.16384 | Network List Manager
|
| | netprovfw.dll | 6.2.10240.16384 | Provisioning Service Framework DLL
|
| | netprovisionsp.dll | 6.2.10240.16384 | Provisioning Service Provider DLL
|
| | netsetupapi.dll | 6.2.10240.16384 | Network Configuration API
|
| | netsetupengine.dll | 6.2.10240.16384 | Network Configuration Engine
|
| | netsetupshim.dll | 6.2.10240.16384 | Network Configuration API
|
| | netshell.dll | 6.2.10240.16384 | Network Connections Shell
|
| | netutils.dll | 6.2.10240.16384 | Net Win32 API Helpers DLL
|
| | networkcollectionagent.dll | 11.0.10240.16384 | Network Collection Agent
|
| | networkexplorer.dll | 6.2.10240.16384 | Network Explorer
|
| | networkitemfactory.dll | 6.2.10240.16384 | NetworkItem Factory
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | ngcksp.dll | 6.2.10240.16384 | Microsoft Passport Key Storage Provider
|
| | ninput.dll | 6.2.10240.16384 | Microsoft Pen and Touch Input Component
|
| | nlaapi.dll | 6.2.10240.16384 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.10240.16384 | HTML filter
|
| | nlmgp.dll | 6.2.10240.16384 | Network List Manager Snapin
|
| | nlmproxy.dll | 6.2.10240.16384 | Network List Manager Public Proxy
|
| | nlmsprep.dll | 6.2.10240.16384 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 6.2.10240.16384 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 6.2.10240.16384 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0009.dll | 6.2.10240.16384 | Microsoft English Natural Language Server Data and Code
|
| | nlsdl.dll | 6.2.10240.16384 | Nls Downlevel DLL
|
| | nlslexicons0009.dll | 6.2.10240.16384 | Microsoft English Natural Language Server Data and Code
|
| | nmaa.dll | 6.2.10240.16384 | NMAA
|
| | nmadirect.dll | 8.1.0.65535 | master branch
|
| | normaliz.dll | 6.2.10240.16384 | Unicode Normalization DLL
|
| | notificationobjfactory.dll | 6.2.10240.16425 | Notifications Object Factory
|
| | npmproxy.dll | 6.2.10240.16384 | Network List Manager Proxy
|
| | npsmdesktopprovider.dll | 6.2.10240.16384 | <d> NPSM Desktop Local Provider DLL
|
| | nshhttp.dll | 6.2.10240.16384 | HTTP netsh DLL
|
| | nshipsec.dll | 6.2.10240.16384 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 6.2.10240.16384 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 6.2.10240.16384 | NSI User-mode interface DLL
|
| | ntasn1.dll | 6.2.10240.16384 | Microsoft ASN.1 API
|
| | ntdll.dll | 6.2.10240.16430 | NT Layer DLL
|
| | ntdsapi.dll | 6.2.10240.16384 | Active Directory Domain Services API
|
| | ntlanman.dll | 6.2.10240.16384 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 6.2.10240.16384 | Network object shell UI
|
| | ntlmshared.dll | 6.2.10240.16384 | NTLM Shared Functionality
|
| | ntmarta.dll | 6.2.10240.16384 | Windows NT MARTA provider
|
| | ntprint.dll | 6.2.10240.16384 | Spooler Setup DLL
|
| | ntshrui.dll | 6.2.10240.16405 | Shell extensions for sharing
|
| | ntvdm64.dll | 6.2.10240.16384 | 16-bit Emulation on NT64
|
| | objsel.dll | 6.2.10240.16384 | Object Picker Dialog
|
| | occache.dll | 11.0.10240.16384 | Object Control Viewer
|
| | ocsetapi.dll | 6.2.10240.16384 | Windows Optional Component Setup API
|
| | odbc32.dll | 6.2.10240.16384 | ODBC Driver Manager
|
| | odbcbcp.dll | 6.2.10240.16384 | BCP for ODBC
|
| | odbcconf.dll | 6.2.10240.16384 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 6.2.10240.16384 | ODBC Installer
|
| | odbccr32.dll | 6.2.10240.16384 | ODBC Cursor Library
|
| | odbccu32.dll | 6.2.10240.16384 | ODBC Cursor Library
|
| | odbcint.dll | 6.2.10240.16384 | ODBC Resources
|
| | odbcji32.dll | 6.2.10240.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 6.2.10240.16384 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 6.2.10240.16384 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 6.2.10240.16384 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 6.2.10240.16384 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 6.2.10240.16384 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 6.2.10240.16384 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 6.2.10240.16384 | ODBC (3.0) driver for text files
|
| | oemlicense.dll | 6.2.10240.16384 | Client Licensing Platform Client Provisioning
|
| | offfilt.dll | 2008.0.10240.16384 | OFFICE Filter
|
| | offlinelsa.dll | 6.2.10240.16384 | Windows
|
| | offlinesam.dll | 6.2.10240.16384 | Windows
|
| | offreg.dll | 6.2.10240.16384 | Offline registry DLL
|
| | ogldrv.dll | 6.2.10240.16384 | MSOGL
|
| | ole2.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2disp.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole2nls.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | ole32.dll | 6.2.10240.16384 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.2.10240.16384 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.2.10240.16384 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.2.10240.16384 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 6.2.10240.16384 |
|
| | olecli32.dll | 6.2.10240.16384 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 6.2.10240.16384 | OLE DB Core Services
|
| | oledb32r.dll | 6.2.10240.16384 | OLE DB Core Services Resources
|
| | oledlg.dll | 6.2.10240.16384 | OLE User Interface Support
|
| | oleprn.dll | 6.2.10240.16384 | Oleprn DLL
|
| | olepro32.dll | 6.2.10240.16384 |
|
| | olesvr32.dll | 6.2.10240.16384 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 6.2.10240.16384 | Microsoft OLE for Windows
|
| | ondemandbrokerclient.dll | 6.2.10240.16384 | OnDemandBrokerClient
|
| | ondemandconnroutehelper.dll | 6.2.10240.16384 | On Demand Connctiond Route Helper
|
| | onedrivesettingsyncprovider.dll | 6.2.10240.16431 | OneDrive Setting Sync
|
| | onex.dll | 6.2.10240.16384 | IEEE 802.1X supplicant library
|
| | onexui.dll | 6.2.10240.16384 | IEEE 802.1X supplicant UI library
|
| | oobefldr.dll | 6.2.10240.16384 | Getting Started
|
| | opcservices.dll | 6.2.10240.16384 | Native Code OPC Services Library
|
| | opencl.dll | 2.0.2.0 | OpenCL Client DLL
|
| | opengl32.dll | 6.2.10240.16384 | OpenGL Client DLL
|
| | osbaseln.dll | 6.2.10240.16384 | Service Reporting API
|
| | osksupport.dll | 6.2.10240.16384 | Microsoft On-Screen Keyboard Support Utilities
|
| | osuninst.dll | 6.2.10240.16384 | Uninstall Interface
|
| | p2p.dll | 6.2.10240.16384 | Peer-to-Peer Grouping
|
| | p2pgraph.dll | 6.2.10240.16384 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 6.2.10240.16384 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 6.2.10240.16384 | Object Packager2
|
| | packagestateroaming.dll | 6.2.10240.16384 | Package State Roaming
|
| | panmap.dll | 6.2.10240.16384 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 6.2.10240.16384 | Auto Enrollment DLL
|
| | pcacli.dll | 6.2.10240.16384 | Program Compatibility Assistant Client Module
|
| | pcaui.dll | 6.2.10240.16384 | Program Compatibility Assistant User Interface Module
|
| | pcpksp.dll | 6.2.10240.16384 | Microsoft Platform Key Storage Provider for Platform Crypto Provider
|
| | pcptpm12.dll | 6.2.10240.16384 | Microsoft Platform Crypto Provider for Trusted Platform Module 1.2
|
| | pcwum.dll | 6.2.10240.16384 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 6.2.10240.16384 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 6.2.10240.16384 | PDH UI
|
| | perfctrs.dll | 6.2.10240.16384 | Performance Counters
|
| | perfdisk.dll | 6.2.10240.16384 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 6.2.10240.16384 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 6.2.10240.16384 | Windows System Performance Objects DLL
|
| | perfproc.dll | 6.2.10240.16384 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 6.2.10240.16384 | Windows Remote Desktop Services Performance Objects
|
| | personax.dll | 6.2.10240.16384 | PersonaX
|
| | phonecallhistoryapis.dll | 6.2.10240.16384 | DLL for PhoneCallHistoryRT
|
| | phoneutil.dll | 6.2.10240.16384 | Phone utilities
|
| | phoneutilres.dll | 6.2.10240.16384 | Resource DLL for Phone utilities
|
| | photometadatahandler.dll | 6.2.10240.16384 | Photo Metadata Handler
|
| | photowiz.dll | 6.2.10240.16384 | Photo Printing Wizard
|
| | pid.dll | 6.2.10240.16384 | Microsoft PID
|
| | pidgenx.dll | 6.2.10240.16384 | Pid Generation
|
| | pifmgr.dll | 6.2.10240.16384 | Windows NT PIF Manager Icon Resources Library
|
| | pimindexmaintenanceclient.dll | 6.2.10240.16384 | Client dll for Pim Index Maintenance
|
| | pimstore.dll | 6.2.10240.16384 | POOM
|
| | pku2u.dll | 6.2.10240.16384 | Pku2u Security Package
|
| | pla.dll | 6.2.10240.16384 | Performance Logs & Alerts
|
| | playlistfolder.dll | 6.2.10240.16384 | Playlist Folder
|
| | playsndsrv.dll | 6.2.10240.16384 | PlaySound Service
|
| | playtodevice.dll | 12.0.10240.16384 | PLAYTODEVICE DLL
|
| | playtomanager.dll | 6.2.10240.16412 | Microsoft Windows PlayTo Manager
|
| | playtomenu.dll | 12.0.10240.16384 | Cast to Device Menu DLL
|
| | playtoreceiver.dll | 12.0.10240.16384 | DLNA DMR DLL
|
| | playtostatusprovider.dll | 6.2.10240.16384 | PlayTo Status Provider Dll
|
| | pngfilt.dll | 11.0.10240.16384 | IE PNG plugin image decoder
|
| | pnrpnsp.dll | 6.2.10240.16384 | PNRP Name Space Provider
|
| | policymanager.dll | 6.2.10240.16384 | Policy Manager DLL
|
| | polstore.dll | 6.2.10240.16384 | Policy Storage dll
|
| | portabledeviceapi.dll | 6.2.10240.16384 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 6.2.10240.16384 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 6.2.10240.16384 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 6.2.10240.16384 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 6.2.10240.16384 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 6.2.10240.16384 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 6.2.10240.16384 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 6.2.10240.16384 | Windows Portable Device WMDRM Component
|
| | posyncservices.dll | 6.2.10240.16384 | Change Tracking
|
| | pots.dll | 6.2.10240.16384 | Power Troubleshooter
|
| | powercpl.dll | 6.2.10240.16384 | Power Options Control Panel
|
| | powrprof.dll | 6.2.10240.16384 | Power Profile Helper DLL
|
| | presentationcffrasterizernative_v0300.dll | 3.0.6920.8674 | WinFX OpenType/CFF Rasterizer
|
| | presentationhostproxy.dll | 6.2.10240.16384 | Windows Presentation Foundation Host Proxy
|
| | presentationnative_v0300.dll | 3.0.6920.8674 | PresentationNative_v0300.dll
|
| | prflbmsg.dll | 6.2.10240.16384 | Perflib Event Messages
|
| | printconfig.dll | 0.3.10240.16384 | PrintConfig User Interface
|
| | printdialogs.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | printplatformconfig.dll | 6.2.10240.16384 | Legacy Print Platform Adapter
|
| | printui.dll | 6.2.10240.16384 | Printer Settings User Interface
|
| | prncache.dll | 6.2.10240.16384 | Print UI Cache
|
| | prnfldr.dll | 6.2.10240.16384 | prnfldr dll
|
| | prnntfy.dll | 6.2.10240.16384 | prnntfy DLL
|
| | prntvpt.dll | 6.2.10240.16384 | Print Ticket Services Module
|
| | profapi.dll | 6.2.10240.16384 | User Profile Basic API
|
| | profext.dll | 6.2.10240.16384 | profext
|
| | propsys.dll | 7.0.10240.16384 | Microsoft Property System
|
| | provcore.dll | 6.2.10240.16384 | Microsoft Wireless Provisioning Core
|
| | provsvc.dll | 6.2.10240.16384 | Windows HomeGroup
|
| | provthrd.dll | 6.2.10240.16384 | WMI Provider Thread & Log Library
|
| | proximitycommon.dll | 6.2.10240.16384 | Proximity Common Implementation
|
| | proximitycommonpal.dll | 6.2.10240.16384 | Proximity Common PAL
|
| | proximityrtapipal.dll | 6.2.10240.16384 | Proximity WinRT API PAL
|
| | prvdmofcomp.dll | 6.2.10240.16384 | WMI
|
| | psapi.dll | 6.2.10240.16384 | Process Status Helper
|
| | pshed.dll | 6.2.10240.16384 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 6.2.10240.16384 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | psmodulediscoveryprovider.dll | 6.2.10240.16384 | WMI
|
| | pstorec.dll | 6.2.10240.16384 | Deprecated Protected Storage COM interfaces
|
| | puiapi.dll | 6.2.10240.16384 | puiapi DLL
|
| | puiobj.dll | 6.2.10240.16384 | PrintUI Objects DLL
|
| | pvl.dll | |
|
| | pwrshplugin.dll | 6.2.10240.16384 | pwrshplugin.dll
|
| | qasf.dll | 12.0.10240.16384 | DirectShow ASF Support
|
| | qcap.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | qdv.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | qdvd.dll | 6.2.10240.16384 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 6.2.10240.16384 | DirectShow Editing.
|
| | qedwipes.dll | 6.2.10240.16384 | DirectShow Editing SMPTE Wipes
|
| | quartz.dll | 6.2.10240.16384 | DirectShow Runtime.
|
| | query.dll | 6.2.10240.16384 | Content Index Utility DLL
|
| | qwave.dll | 6.2.10240.16384 | Windows NT
|
| | racengn.dll | 6.2.10240.16384 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 6.2.10240.16384 | Remote Assistance Contact List
|
| | radardt.dll | 6.2.10240.16384 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 6.2.10240.16384 | Microsoft Windows Resource Exhaustion Resolver
|
| | radcui.dll | 6.2.10240.16384 | RemoteApp and Desktop Connection UI Component
|
| | rasadhlp.dll | 6.2.10240.16384 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 6.2.10240.16384 | Remote Access API
|
| | rascfg.dll | 6.2.10240.16384 | RAS Configuration Objects
|
| | raschap.dll | 6.2.10240.16384 | Remote Access PPP CHAP
|
| | raschapext.dll | 6.2.10240.16384 | Windows Extension library for raschap
|
| | rasctrs.dll | 6.2.10240.16384 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 6.2.10240.16384 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 6.2.10240.16384 | Remote Access Common Dialog API
|
| | rasgcw.dll | 6.2.10240.16384 | RAS Wizard Pages
|
| | rasman.dll | 6.2.10240.16384 | Remote Access Connection Manager
|
| | rasmontr.dll | 6.2.10240.16384 | RAS Monitor DLL
|
| | rasmxs.dll | 6.2.10240.16384 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 6.2.10240.16384 | RAS PLAP Credential Provider
|
| | rasppp.dll | 6.2.10240.16384 | Remote Access PPP
|
| | rasser.dll | 6.2.10240.16384 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 6.2.10240.16384 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 6.2.10240.16384 | Remote Access PPP EAP-TLS
|
| | rastlsext.dll | 6.2.10240.16384 | Windows Extension library for rastls
|
| | rdpcore.dll | 6.2.10240.16384 | RDP Core DLL
|
| | rdpencom.dll | 6.2.10240.16384 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 6.2.10240.16384 | RDP Audio Endpoint
|
| | rdpsaps.dll | 6.2.10240.16384 | RDP Session Agent Proxy Stub
|
| | rdvidcrl.dll | 6.2.10240.16384 | Remote Desktop Services Client for Microsoft Online Services
|
| | rdvvmtransport.dll | 6.2.10240.16384 | RdvVmTransport EndPoints
|
| | reagent.dll | 6.2.10240.16431 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 6.2.10240.16384 | Registry Configuration APIs
|
| | regctrl.dll | 6.2.10240.16384 | RegCtrl
|
| | reinfo.dll | 6.2.10240.16431 | Microsoft Windows Recovery Info DLL
|
| | remoteaudioendpoint.dll | 6.2.10240.16384 | Remote Audio Endpoint
|
| | remotenaturallanguage.dll | 1.0.0.1 | Speech Client Communication To Backend Speech Services Library.
|
| | remotepg.dll | 6.2.10240.16384 | Remote Sessions CPL Extension
|
| | removedevicecontexthandler.dll | 6.2.10240.16384 | Devices & Printers Remove Device Context Menu Handler
|
| | removedeviceelevated.dll | 6.2.10240.16384 | RemoveDeviceElevated Proxy Dll
|
| | resampledmo.dll | 6.2.10240.16384 | Windows Media Resampler
|
| | resutils.dll | 6.2.10240.16384 | Microsoft Cluster Resource Utility DLL
|
| | rfxvmt.dll | 6.2.10240.16384 | Microsoft RemoteFX VM Transport
|
| | rgb9rast.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1231 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 6.2.10240.16384 | Wrapper Dll for Richedit 1.0
|
| | rmclient.dll | 6.2.10240.16384 | Resource Manager Client
|
| | rnr20.dll | 6.2.10240.16384 | Windows Socket2 NameSpace DLL
|
| | rometadata.dll | 4.6.79.0 | Microsoft MetaData Library
|
| | rpchttp.dll | 6.2.10240.16384 | RPC HTTP DLL
|
| | rpcns4.dll | 6.2.10240.16384 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 6.2.10240.16384 | RPC Netshell Helper
|
| | rpcrt4.dll | 6.2.10240.16412 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 6.2.10240.16384 | Remote RPC Extension
|
| | rsaenh.dll | 6.2.10240.16384 | Microsoft Enhanced Cryptographic Provider
|
| | rshx32.dll | 6.2.10240.16384 | Security Shell Extension
|
| | rstrtmgr.dll | 6.2.10240.16384 | Restart Manager
|
| | rtffilt.dll | 2008.0.10240.16384 | RTF Filter
|
| | rtm.dll | 6.2.10240.16384 | Routing Table Manager
|
| | rtmediaframe.dll | 6.2.10240.16384 | Windows Runtime MediaFrame DLL
|
| | rtutils.dll | 6.2.10240.16384 | Routing Utilities
|
| | rtworkq.dll | 12.0.10240.16384 | Realtime WorkQueue DLL
|
| | samcli.dll | 6.2.10240.16384 | Security Accounts Manager Client DLL
|
| | samlib.dll | 6.2.10240.16384 | SAM Library DLL
|
| | sas.dll | 6.2.10240.16384 | WinLogon Software SAS Library
|
| | sbe.dll | 6.2.10240.16384 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.10240.16384 | Stream Buffer IO DLL
|
| | sberes.dll | 6.2.10240.16384 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 6.2.10240.16384 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 6.2.10240.16384 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 6.2.10240.16384 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 6.2.10240.16384 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 6.2.10240.16384 | TLS / SSL Security Provider
|
| | schedcli.dll | 6.2.10240.16384 | Scheduler Service Client DLL
|
| | scksp.dll | 6.2.10240.16384 | Microsoft Smart Card Key Storage Provider
|
| | scripto.dll | 6.6.10240.16384 | Microsoft ScriptO
|
| | scrobj.dll | 5.812.10240.16384 | Windows ® Script Component Runtime
|
| | scrrun.dll | 5.812.10240.16384 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 6.2.10240.16384 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 6.2.10240.16384 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 6.2.10240.16384 | NPS SDO Helper Component
|
| | search.protocolhandler.mapi2.dll | 7.0.10240.16384 | Microsoft Search Protocol Handler for MAPI2
|
| | searchfolder.dll | 6.2.10240.16405 | SearchFolder
|
| | sechost.dll | 6.2.10240.16384 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 6.2.10240.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 6.2.10240.16384 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 6.2.10240.16384 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 6.2.10240.16384 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | security.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | sendmail.dll | 6.2.10240.16405 | Send Mail
|
| | sensapi.dll | 6.2.10240.16384 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 6.2.10240.16390 | Sensor API
|
| | sensorscpl.dll | 6.2.10240.16384 | Open Location and Other Sensors
|
| | sensorsnativeapi.dll | 6.2.10240.16384 | Sensors Native API
|
| | sensorsnativeapi.v2.dll | 6.2.10240.16412 | Sensors Native API (V2 stack)
|
| | sensorsutilsv2.dll | 6.2.10240.16384 | Sensors v2 Utilities DLL
|
| | serialui.dll | 6.2.10240.16384 | Serial Port Property Pages
|
| | serwvdrv.dll | 6.2.10240.16384 | Unimodem Serial Wave driver
|
| | sessenv.dll | 6.2.10240.16384 | Remote Desktop Configuration service
|
| | settingmonitor.dll | 6.2.10240.16384 | Setting Synchronization Change Monitor
|
| | settingsync.dll | 6.2.10240.16384 | Setting Synchronization
|
| | settingsynccore.dll | 6.2.10240.16384 | Setting Synchronization Core
|
| | settingsyncpolicy.dll | 6.2.10240.16384 | SettingSync Policy
|
| | setupapi.dll | 6.2.10240.16384 | Windows Setup API
|
| | setupcln.dll | 6.2.10240.16384 | Setup Files Cleanup
|
| | sfc.dll | 6.2.10240.16384 | Windows File Protection
|
| | sfc_os.dll | 6.2.10240.16384 | Windows File Protection
|
| | shacct.dll | 6.2.10240.16384 | Shell Accounts Classes
|
| | sharehost.dll | 6.2.10240.16384 | ShareHost
|
| | shcore.dll | 6.2.10240.16384 | SHCORE
|
| | shdocvw.dll | 6.2.10240.16384 | Shell Doc Object and Control Library
|
| | shell32.dll | 6.2.10240.16425 | Windows Shell Common Dll
|
| | shellstyle.dll | 6.2.10240.16384 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 6.2.10240.16384 | Shell Folder Service
|
| | shgina.dll | 6.2.10240.16384 | Windows Shell User Logon
|
| | shimeng.dll | 6.2.10240.16384 | Shim Engine DLL
|
| | shimgvw.dll | 6.2.10240.16384 | Photo Gallery Viewer
|
| | shlwapi.dll | 6.2.10240.16384 | Shell Light-weight Utility Library
|
| | shpafact.dll | 6.2.10240.16384 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 6.2.10240.16384 | Shell setup helper
|
| | shsvcs.dll | 6.2.10240.16384 | Windows Shell Services Dll
|
| | shunimpl.dll | 6.2.10240.16384 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 6.2.10240.16384 | Windows Shell Web Services
|
| | signdrv.dll | 6.2.10240.16384 | WMI provider for Signed Drivers
|
| | simauth.dll | 6.2.10240.16384 | EAP SIM run-time dll
|
| | simcfg.dll | 6.2.10240.16384 | EAP SIM config dll
|
| | sisbkup.dll | 6.2.10240.16384 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 6.2.10240.16384 | Software Licensing Client Dll
|
| | slcext.dll | 6.2.10240.16384 | Software Licensing Client Extension Dll
|
| | slwga.dll | 6.2.10240.16384 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 6.2.10240.16384 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | smphost.dll | 6.2.10240.16384 | Storage Management Provider (SMP) host service
|
| | sndvolsso.dll | 6.2.10240.16384 | SCA Volume
|
| | snmpapi.dll | 6.2.10240.16384 | SNMP Utility Library
|
| | softkbd.dll | 6.2.10240.16384 | Soft Keyboard Server and Tip
|
| | softpub.dll | 6.2.10240.16384 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 6.2.10240.16384 | Sort Version Server 2003
|
| | sortwindows61.dll | 6.2.10240.16384 | SortWindows61 Dll
|
| | sortwindows6compat.dll | 6.2.10240.16384 | Sort Version Windows 6.0
|
| | spbcd.dll | 6.2.10240.16393 | BCD Sysprep Plugin
|
| | spfileq.dll | 6.2.10240.16384 | Windows SPFILEQ
|
| | spinf.dll | 6.2.10240.16384 | Windows SPINF
|
| | spnet.dll | 6.2.10240.16384 | Net Sysprep Plugin
|
| | spopk.dll | 6.2.10240.16384 | OPK Sysprep Plugin
|
| | spp.dll | 6.2.10240.16384 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 6.2.10240.16384 | Software Licensing Client Dll
|
| | sppcext.dll | 6.2.10240.16384 | Software Protection Platform Client Extension Dll
|
| | sppinst.dll | 6.2.10240.16384 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 6.2.10240.16384 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 6.2.10240.16384 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 6.2.10240.16384 | Setup Wizard Framework
|
| | spwizimg.dll | 6.2.10240.16384 | Setup Wizard Framework Resources
|
| | spwizres.dll | 6.2.10240.16384 | Setup Wizard Framework Resources
|
| | spwmp.dll | 6.2.10240.16384 | Windows Media Player System Preparation DLL
|
| | sqlcecompact40.dll | 4.0.8275.1 | Database Repair Tool (32-bit)
|
| | sqlceoledb40.dll | 4.0.10240.1 | OLEDB Provider (32-bit)
|
| | sqlceqp40.dll | 4.0.10240.1 | Query Processor (32-bit)
|
| | sqlcese40.dll | 4.0.10240.1 | Storage Engine (32-bit)
|
| | sqloledb.dll | 6.2.10240.16384 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 6.2.10240.16384 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.2039.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 2000.80.2039.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 2000.80.2040.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 6.2.10240.16384 | XML extensions for SQL Server
|
| | sqmapi.dll | 6.2.10240.16384 | SQM Client
|
| | srchadmin.dll | 7.0.10240.16384 | Indexing Options
|
| | srclient.dll | 6.2.10240.16384 | Microsoft® Windows System Restore Client Library
|
| | srh.dll | 6.2.10240.16384 | Screen Reader Helper DLL
|
| | srhinproc.dll | 6.2.10240.16384 | Screen Reader Helper DLL
|
| | srpapi.dll | 6.2.10240.16384 | SRP APIs Dll
|
| | srumapi.dll | 6.2.10240.16384 | System Resource Usage Monitor API
|
| | srumsvc.dll | 6.2.10240.16391 | System Resource Usage Monitor Service
|
| | srvcli.dll | 6.2.10240.16384 | Server Service Client DLL
|
| | sscore.dll | 6.2.10240.16384 | Server Service Core DLL
|
| | ssdpapi.dll | 6.2.10240.16384 | SSDP Client API DLL
|
| | sspicli.dll | 6.2.10240.16384 | Security Support Provider Interface
|
| | ssshim.dll | 6.2.10240.16384 | Windows Componentization Platform Servicing API
|
| | startupscan.dll | 6.2.10240.16384 | Startup scan task DLL
|
| | staterepository.core.dll | 6.2.10240.16384 | StateRepository Core
|
| | stclient.dll | 2001.12.10941.16384 | COM+ Configuration Catalog Client
|
| | sti.dll | 6.2.10240.16384 | Still Image Devices client DLL
|
| | stobject.dll | 6.2.10240.16405 | Systray shell service object
|
| | storage.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | storagecontexthandler.dll | 6.2.10240.16384 | Device Center Storage Context Menu Handler
|
| | storagewmi.dll | 6.2.10240.16384 | WMI Provider for Storage Management
|
| | storagewmi_passthru.dll | 6.2.10240.16384 | WMI PassThru Provider for Storage Management
|
| | storprop.dll | 6.2.10240.16384 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.10240.16384 | Structured Query
|
| | sud.dll | 6.2.10240.16384 | SUD Control Panel
|
| | suplcsps.dll | 6.2.10240.16384 | Windows Supl CSP implementation
|
| | sxproxy.dll | 6.2.10240.16384 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 6.2.10240.16384 | Fusion 2.5
|
| | sxshared.dll | 6.2.10240.16384 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 6.2.10240.16384 | Sxs Store DLL
|
| | synccenter.dll | 6.2.10240.16384 | Microsoft Sync Center
|
| | synceng.dll | 6.2.10240.16384 | Windows Briefcase Engine
|
| | synchostps.dll | 6.2.10240.16384 | Proxystub for sync host
|
| | syncinfrastructure.dll | 6.2.10240.16384 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 6.2.10240.16384 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncreg.dll | 2007.94.10240.16384 | Microsoft Synchronization Framework Registration
|
| | syncsettings.dll | 6.2.10240.16384 | Sync Settings
|
| | syncui.dll | 6.2.10240.16384 | Windows Briefcase
|
| | syssetup.dll | 6.2.10240.16384 | Windows NT System Setup
|
| | systemcpl.dll | 6.2.10240.16389 | My System CPL
|
| | systemeventsbrokerclient.dll | 6.2.10240.16384 | system Events Broker Client Library
|
| | t2embed.dll | 6.2.10240.16384 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 6.2.10240.16384 | Microsoft TAPI3
|
| | tapi32.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 6.2.10240.16384 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 6.2.10240.16384 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 6.2.10240.16384 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 6.2.10240.16384 | Task Scheduler COM API
|
| | taskschdps.dll | 6.2.10240.16384 | Task Scheduler Interfaces Proxy
|
| | tbauth.dll | 6.2.10240.16384 | TBAuth protocol handler
|
| | tbs.dll | 6.2.10240.16384 | TBS
|
| | tcpipcfg.dll | 6.2.10240.16384 | Network Configuration Objects
|
| | tcpmib.dll | 6.2.10240.16384 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 6.2.10240.16384 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 6.2.10240.16384 | Event Trace Helper Library
|
| | termmgr.dll | 6.2.10240.16384 | Microsoft TAPI3 Terminal Manager
|
| | tetheringclient.dll | 6.2.10240.16431 | Tethering Client
|
| | textinputframework.dll | |
|
| | themecpl.dll | 6.2.10240.16384 | Personalization CPL
|
| | themeui.dll | 6.2.10240.16384 | Windows Theme API
|
| | threadpoolwinrt.dll | 6.2.10240.16384 | Windows WinRT Threadpool
|
| | thumbcache.dll | 6.2.10240.16384 | Microsoft Thumbnail Cache
|
| | timebrokerclient.dll | 6.2.10240.16384 | Time Broker Client Library
|
| | timedatemuicallback.dll | 6.2.10240.16384 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 6.2.10240.16384 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tokenbinding.dll | 6.2.10240.16384 | Token Binding Protocol
|
| | tokenbroker.dll | 6.2.10240.16384 | Token Broker
|
| | tokenbrokerui.dll | 6.2.10240.16384 | Token Broker UI
|
| | tpmcertresources.dll | 6.2.10240.16384 | TpmCertResources
|
| | tpmcompc.dll | 6.2.10240.16384 | Computer Chooser Dialog
|
| | tpmcoreprovisioning.dll | 6.2.10240.16384 | TPM Core Provisioning Library
|
| | tquery.dll | 7.0.10240.16431 | Microsoft Tripoli Query
|
| | traffic.dll | 6.2.10240.16384 | Microsoft Traffic Control 1.0 DLL
|
| | tsbyuv.dll | 6.2.10240.16384 | Toshiba Video Codec
|
| | tschannel.dll | 6.2.10240.16384 | Task Scheduler Proxy
|
| | tsgqec.dll | 6.2.10240.16384 | RD Gateway QEC
|
| | tsmf.dll | 6.2.10240.16384 | RDP MF Plugin
|
| | tspkg.dll | 6.2.10240.16384 | Web Service Security Package
|
| | tsworkspace.dll | 6.2.10240.16384 | RemoteApp and Desktop Connection Component
|
| | ttlsauth.dll | 6.2.10240.16384 | EAP TTLS run-time dll
|
| | ttlscfg.dll | 6.2.10240.16384 | EAP TTLS configuration dll
|
| | ttlsext.dll | 6.2.10240.16384 | Windows Extension library for EAP TTLS
|
| | tvratings.dll | 6.2.10240.16384 | Module for managing TV ratings
|
| | twext.dll | 6.2.10240.16384 | Previous Versions property page
|
| | twinapi.appcore.dll | 6.2.10240.16397 | twinapi.appcore
|
| | twinapi.dll | 6.2.10240.16384 | twinapi
|
| | twinui.appcore.dll | 6.2.10240.16412 | TWINUI.APPCORE
|
| | twinui.dll | 6.2.10240.16412 | TWINUI
|
| | txflog.dll | 2001.12.10941.16384 | COM+
|
| | txfw32.dll | 6.2.10240.16384 | TxF Win32 DLL
|
| | typelib.dll | 3.10.0.103 | Windows Win16 Application Launcher
|
| | tzres.dll | 6.2.10240.16384 | Time Zones resource DLL
|
| | ucmhc.dll | 6.2.10240.16384 | UCM Helper Class
|
| | ucrtbase.dll | 6.2.10240.16384 | Microsoft® C Runtime Library
|
| | udhisapi.dll | 6.2.10240.16384 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 6.2.10240.16384 | eXfat Utility DLL
|
| | ufat.dll | 6.2.10240.16384 | FAT Utility DLL
|
| | uianimation.dll | 6.2.10240.16384 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.2.10240.16431 | Microsoft UI Automation Core
|
| | uiautomationcoreres.dll | 7.2.10240.16384 | Microsoft UI Automation Core Resource
|
| | uicom.dll | 6.2.10240.16384 | Add/Remove Modems
|
| | uireng.dll | 6.2.10240.16384 | UI Recording Engine Library
|
| | uiribbon.dll | 6.2.10240.16393 | Windows Ribbon Framework
|
| | uiribbonres.dll | 6.2.10240.16393 | Windows Ribbon Framework Resources
|
| | ulib.dll | 6.2.10240.16384 | File Utilities Support DLL
|
| | umdmxfrm.dll | 6.2.10240.16384 | Unimodem Tranform Module
|
| | unimdmat.dll | 6.2.10240.16384 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 6.2.10240.16384 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | unistore.dll | 6.2.10240.16401 | Unified Store
|
| | untfs.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | updatepolicy.dll | 6.2.10240.16384 | Update Policy Reader
|
| | upnp.dll | 6.2.10240.16384 | UPnP Control Point API
|
| | upnphost.dll | 6.2.10240.16384 | UPnP Device Host
|
| | urefs.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | urefsv1.dll | 6.2.10240.16384 | NTFS Utility DLL
|
| | ureg.dll | 6.2.10240.16384 | Registry Utility DLL
|
| | url.dll | 11.0.10240.16384 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 11.0.10240.16391 | OLE32 Extensions for Win32
|
| | usbceip.dll | 6.2.10240.16384 | USBCEIP Task
|
| | usbperf.dll | 6.2.10240.16384 | USB Performance Objects DLL
|
| | usbui.dll | 6.2.10240.16384 | USB UI Dll
|
| | user32.dll | 6.2.10240.16384 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 6.2.10240.16384 | UserAccountControlSettings
|
| | usercpl.dll | 6.2.10240.16384 | User control panel
|
| | userdataaccessres.dll | 6.2.10240.16384 | Resource DLL for the UserDataAccess stack
|
| | userdataaccountapis.dll | 6.2.10240.16384 | DLL for UserDataAccountsRT
|
| | userdatalanguageutil.dll | 6.2.10240.16384 | Language-related helper functions for user data
|
| | userdataplatformhelperutil.dll | 6.2.10240.16384 | Platform Utilities for data access
|
| | userdatatimeutil.dll | 6.2.10240.16384 | Time-related helper functions for user data
|
| | userdatatypehelperutil.dll | 6.2.10240.16384 | Type Utilities for data access
|
| | userdeviceregistration.dll | 6.2.10240.16384 | AAD User Device Registration WinRT
|
| | userdeviceregistration.ngc.dll | 6.2.10240.16384 | AD/AAD User Device Registration WinRT
|
| | userenv.dll | 6.2.10240.16384 | Userenv
|
| | userinitext.dll | 6.2.10240.16384 | UserInit Utility Extension DLL
|
| | userlanguageprofilecallback.dll | 6.2.10240.16384 | MUI Callback for User Language profile changed
|
| | userlanguagescpl.dll | 6.2.10240.16384 | My Languages Configuration Control Panel
|
| | usermgrcli.dll | 6.2.10240.16384 | UserMgr API DLL
|
| | usermgrproxy.dll | 6.2.10240.16431 | UserMgrProxy
|
| | usp10.dll | 6.2.10240.16384 | Uniscribe Unicode script processor
|
| | ustprov.dll | 6.2.10240.16384 | User State WMI Provider
|
| | utildll.dll | 6.2.10240.16384 | WinStation utility support DLL
|
| | uudf.dll | 6.2.10240.16384 | UDF Utility DLL
|
| | uxinit.dll | 6.2.10240.16384 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 6.2.10240.16384 | Setup Wizard Framework
|
| | uxlibres.dll | 6.2.10240.16384 | UXLib Resources
|
| | uxtheme.dll | 6.2.10240.16397 | Microsoft UxTheme Library
|
| | van.dll | 6.2.10240.16384 | View Available Networks
|
| | vault.dll | 6.2.10240.16384 | Windows vault Control Panel
|
| | vaultcli.dll | 6.2.10240.16384 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbscript.dll | 5.812.10240.16384 | Microsoft ® VBScript
|
| | vcardparser.dll | 6.2.10240.16384 | Supports the parsing of VCard and ICal formatted data
|
| | vccorlib110.dll | 11.0.50727.1 | Microsoft ® VC WinRT core library
|
| | vccorlib120.dll | 12.0.21005.1 | Microsoft ® VC WinRT core library
|
| | vdmdbg.dll | 6.2.10240.16384 | VDMDBG.DLL
|
| | vds_ps.dll | 6.2.10240.16384 | Microsoft® Virtual Disk Service proxy/stub
|
| | vedatalayerhelpers.dll | 6.2.10240.16425 | Visual Element DataLayer Helpers
|
| | veeventdispatcher.dll | 6.2.10240.16425 | Visual Element Event dispatcher
|
| | verifier.dll | 6.2.10240.16384 | Standard application verifier provider dll
|
| | version.dll | 6.2.10240.16384 | Version Checking and File Installation Libraries
|
| | vfwwdm32.dll | 6.2.10240.16384 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 6.2.10240.16384 | Windows Media Resizer
|
| | virtdisk.dll | 6.2.10240.16384 | Virtual Disk API DLL
|
| | voiceactivationmanager.dll | 6.2.10240.16412 | Windows Voice Activation Manager
|
| | vpnikeapi.dll | 6.2.10240.16384 | VPN IKE API's
|
| | vscmgrps.dll | 6.2.10240.16384 | Microsoft Virtual Smart Card Manager Proxy/Stub
|
| | vss_ps.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 6.2.10240.16384 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 6.2.10240.16384 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 6.2.10240.16384 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 6.2.10240.16384 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 6.2.10240.16384 | Microsoft Windows Contacts Sync Provider
|
| | walletbackgroundserviceproxy.dll | 6.2.10240.16384 | Wallet Background Proxy
|
| | walletproxy.dll | 6.2.10240.16384 | Wallet proxy
|
| | wavemsp.dll | 6.2.10240.16384 | Microsoft Wave MSP
|
| | wbemcomn.dll | 6.2.10240.16384 | WMI
|
| | wcmapi.dll | 6.2.10240.16384 | Windows Connection Manager Client API
|
| | wcnapi.dll | 6.2.10240.16384 | Windows Connect Now - API Helper DLL
|
| | wcnwiz.dll | 6.2.10240.16384 | Windows Connect Now Wizards
|
| | wcspluginservice.dll | 6.2.10240.16384 | WcsPlugInService DLL
|
| | wdc.dll | 6.2.10240.16384 | Performance Monitor
|
| | wdi.dll | 6.2.10240.16384 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 6.2.10240.16384 | Microsoft Digest Access
|
| | wdscore.dll | 6.2.10240.16384 | Panther Engine Module
|
| | webcamui.dll | 6.2.10240.16384 | Microsoft® Windows® Operating System
|
| | webcheck.dll | 11.0.10240.16384 | Web Site Monitor
|
| | webclnt.dll | 6.2.10240.16384 | Web DAV Service DLL
|
| | webio.dll | 6.2.10240.16384 | Web Transfer Protocols API
|
| | webservices.dll | 6.2.10240.16384 | Windows Web Services Runtime
|
| | websocket.dll | 6.2.10240.16384 | Web Socket API
|
| | wecapi.dll | 6.2.10240.16384 | Event Collector Configuration API
|
| | wer.dll | 6.2.10240.16384 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 6.2.10240.16384 | WER Diagnostic Controller
|
| | weretw.dll | |
|
| | werui.dll | 6.2.10240.16384 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 6.2.10240.16384 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 6.2.10240.16384 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 6.2.10240.16384 | Windows Firewall GPO Helper dll
|
| | wfdprov.dll | 6.2.10240.16384 | Private WPS provisioning API DLL for Wi-Fi Direct
|
| | wfhc.dll | 6.2.10240.16384 | Windows Firewall Helper Class
|
| | whhelper.dll | 6.2.10240.16384 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 6.2.10240.16384 | WIA Automation Layer
|
| | wiadefui.dll | 6.2.10240.16384 | WIA Scanner Default UI
|
| | wiadss.dll | 6.2.10240.16384 | WIA TWAIN compatibility layer
|
| | wiascanprofiles.dll | 6.2.10240.16384 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 6.2.10240.16384 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 6.2.10240.16384 | WIA Tracing
|
| | wifidisplay.dll | 6.2.10240.16384 | Wi-Fi Display DLL
|
| | wimgapi.dll | 6.2.10240.16401 | Windows Imaging Library
|
| | winbio.dll | 6.2.10240.16384 | Windows Biometrics Client API
|
| | winbioext.dll | 6.2.10240.16384 | Windows Biometrics Client Extension API
|
| | winbrand.dll | 6.2.10240.16384 | Windows Branding Resources
|
| | wincorlib.dll | 6.2.10240.16384 | Microsoft Windows ® WinRT core library
|
| | wincredprovider.dll | 6.2.10240.16384 | wincredprovider DLL
|
| | windows.accountscontrol.dll | 6.2.10240.16384 | Windows Accounts Control
|
| | windows.applicationmodel.background.systemeventsbroker.dll | 6.2.10240.16384 | Windows Background System Events Broker API Server
|
| | windows.applicationmodel.background.timebroker.dll | 6.2.10240.16384 | Windows Background Time Broker API Server
|
| | windows.applicationmodel.core.dll | 6.2.10240.16384 | Windows Application Model Core API
|
| | windows.applicationmodel.dll | 6.2.10240.16384 | Windows ApplicationModel API Server
|
| | windows.applicationmodel.lockscreen.dll | 6.2.10240.16425 | Windows Lock Application Framework DLL
|
| | windows.applicationmodel.store.dll | 6.2.10240.16431 | Windows Store Runtime DLL
|
| | windows.applicationmodel.store.testingframework.dll | 6.2.10240.16431 | Windows Store Testing Framework Runtime DLL
|
| | windows.applicationmodel.wallet.dll | 6.2.10240.16384 | Windows ApplicationModel Wallet Runtime DLL
|
| | windows.data.pdf.dll | 6.2.10240.16384 | PDF WinRT APIs
|
| | windows.devices.alljoyn.dll | 6.2.10240.16384 | Windows.Devices.AllJoyn DLL
|
| | windows.devices.background.dll | 6.2.10240.16384 | Windows.Devices.Background
|
| | windows.devices.background.ps.dll | 6.2.10240.16384 | Windows.Devices.Background Interface Proxy
|
| | windows.devices.bluetooth.dll | 6.2.10240.16397 | Windows.Devices.Bluetooth DLL
|
| | windows.devices.custom.dll | 6.2.10240.16384 | Windows.Devices.Custom
|
| | windows.devices.custom.ps.dll | 6.2.10240.16384 | Windows.Devices.Custom Interface Proxy
|
| | windows.devices.enumeration.dll | 6.2.10240.16384 | Windows.Devices.Enumeration
|
| | windows.devices.humaninterfacedevice.dll | 6.2.10240.16384 | Windows.Devices.HumanInterfaceDevice DLL
|
| | windows.devices.lights.dll | 6.2.10240.16384 | Windows Runtime Lights DLL
|
| | windows.devices.midi.dll | 6.2.10240.16384 | Windows Runtime MIDI Device server DLL
|
| | windows.devices.perception.dll | 6.2.10240.16384 | Windows Devices Perception API
|
| | windows.devices.picker.dll | 6.2.10240.16384 | Device Picker
|
| | windows.devices.pointofservice.dll | 6.2.10240.16384 | Windows Runtime PointOfService DLL
|
| | windows.devices.portable.dll | 6.2.10240.16384 | Windows Runtime Portable Devices DLL
|
| | windows.devices.printers.dll | 6.2.10240.16384 | Windows Runtime Devices Printers DLL
|
| | windows.devices.printers.extensions.dll | 6.2.10240.16384 | Windows.Devices.Printers.Extensions
|
| | windows.devices.radios.dll | 6.2.10240.16384 | Windows.Devices.Radios DLL
|
| | windows.devices.scanners.dll | 6.2.10240.16384 | Windows Runtime Devices Scanners DLL
|
| | windows.devices.sensors.dll | 6.2.10240.16392 | Windows Runtime Sensors DLL
|
| | windows.devices.serialcommunication.dll | 6.2.10240.16384 | Windows.Devices.SerialCommunication DLL
|
| | windows.devices.smartcards.dll | 6.2.10240.16384 | Windows Runtime Smart Card API DLL
|
| | windows.devices.usb.dll | 6.2.10240.16384 | Windows Runtime Usb DLL
|
| | windows.devices.wifi.dll | 6.2.10240.16384 | Windows.Devices.WiFi DLL
|
| | windows.devices.wifidirect.dll | 6.2.10240.16384 | Windows.Devices.WiFiDirect DLL
|
| | windows.energy.dll | 6.2.10240.16384 | Windows Energy Runtime DLL
|
| | windows.gaming.input.dll | 6.2.10240.16384 | Windows Gaming Input API
|
| | windows.gaming.preview.dll | 6.2.10240.16384 | Windows Gaming API Preview
|
| | windows.gaming.xboxlive.storage.dll | 6.2.10240.16384 | Xbox Connected Storage WinRT implementation
|
| | windows.globalization.dll | 6.2.10240.16384 | Windows Globalization
|
| | windows.globalization.fontgroups.dll | 6.2.10240.16384 | Fonts Mapping API
|
| | windows.graphics.dll | 6.2.10240.16384 | WinRT Windows Graphics DLL
|
| | windows.graphics.printing.3d.dll | 6.2.10240.16384 | Microsoft Windows Printing Support
|
| | windows.graphics.printing.dll | 6.2.10240.16384 | Microsoft Windows Printing Support
|
| | windows.internal.bluetooth.dll | 6.2.10240.16397 | Windows.Internal.Bluetooth DLL
|
| | windows.internal.management.dll | 6.2.10240.16384 | Windows Managent Service DLL
|
| | windows.management.lockdown.dll | 6.2.10240.16384 | Windows Runtime Lockdown Management DLL
|
| | windows.management.workplace.workplacesettings.dll | 6.2.10240.16384 | Windows Runtime WorkplaceSettings DLL
|
| | windows.media.audio.dll | 6.2.10240.16384 | Windows Runtime Window Media Audio server DLL
|
| | windows.media.backgroundmediaplayback.dll | 6.2.10240.16384 | Windows Media BackgroundMediaPlayback DLL
|
| | windows.media.devices.dll | 6.2.10240.16384 | Windows Runtime media device server DLL
|
| | windows.media.dll | 6.2.10240.16401 | Windows Media Runtime DLL
|
| | windows.media.editing.dll | 6.2.10240.16393 | Windows Media Editing DLL
|
| | windows.media.faceanalysis.dll | 6.2.10240.16384 | Microsoft (R) Face Detection DLL
|
| | windows.media.import.dll | 6.2.10240.16393 | Windows Photo Import API (WinRT/COM)
|
| | windows.media.mediacontrol.dll | 6.2.10240.16384 | Windows Runtime MediaControl server DLL
|
| | windows.media.ocr.dll | 6.2.10240.16384 | Windows OCR Runtime DLL
|
| | windows.media.playback.backgroundmediaplayer.dll | 6.2.10240.16384 | Windows Media Playback BackgroundMediaPlayer DLL
|
| | windows.media.playback.mediaplayer.dll | 6.2.10240.16384 | Windows Media Playback MediaPlayer DLL
|
| | windows.media.playback.proxystub.dll | 6.2.10240.16384 | BackgroundMediaPlayer Proxy Stub DLL
|
| | windows.media.protection.playready.dll | 3.0.2777.0 | Microsoft PlayReady Client Framework Dll
|
| | windows.media.speech.dll | 6.2.10240.16425 | Windows Speech Runtime DLL
|
| | windows.media.speech.uxres.dll | 6.2.10240.16384 | Windows Media Speech UX Resources DLL
|
| | windows.media.streaming.dll | 12.0.10240.16384 | DLNA DLL
|
| | windows.media.streaming.ps.dll | 12.0.10240.16384 | DLNA Proxy-Stub DLL
|
| | windows.networking.backgroundtransfer.backgroundmanagerpolicy.dll | 6.2.10240.16384 | Background Transfer Background Manager Policy DLL
|
| | windows.networking.backgroundtransfer.dll | 6.2.10240.16384 | Windows.Networking.BackgroundTransfer DLL
|
| | windows.networking.connectivity.dll | 6.2.10240.16401 | Windows Networking Connectivity Runtime DLL
|
| | windows.networking.dll | 6.2.10240.16384 | Windows.Networking DLL
|
| | windows.networking.hostname.dll | 6.2.10240.16384 | Windows.Networking.HostName DLL
|
| | windows.networking.networkoperators.hotspotauthentication.dll | 6.2.10240.16384 | Microsoft Windows Hotspot Authentication API
|
| | windows.networking.proximity.dll | 6.2.10240.16384 | Windows Runtime Proximity API DLL
|
| | windows.networking.servicediscovery.dnssd.dll | 6.2.10240.16384 | Windows.Networking.ServiceDiscovery.Dnssd DLL
|
| | windows.networking.sockets.pushenabledapplication.dll | 6.2.10240.16384 | Windows.Networking.Sockets.PushEnabledApplication DLL
|
| | windows.networking.xboxlive.proxystub.dll | 6.2.10240.16384 | Windows.Networking.XboxLive Proxy Stub Dll
|
| | windows.security.authentication.onlineid.dll | 6.2.10240.16384 | Windows Runtime OnlineId Authentication DLL
|
| | windows.security.authentication.web.core.dll | 6.2.10240.16384 | Token Broker WinRT API
|
| | windows.security.credentials.ui.credentialpicker.dll | 6.2.10240.16384 | WinRT Credential Picker Server
|
| | windows.security.credentials.ui.userconsentverifier.dll | 6.2.10240.16384 | Windows User Consent Verifier API
|
| | windows.shell.search.urihandler.dll | 6.2.10240.16384 | Windows Search URI Handler
|
| | windows.shell.servicehostbuilder.dll | 6.2.10240.16384 | Windows.Shell.ServiceHostBuilder
|
| | windows.speech.pal.dll | 6.2.10240.16384 | Speech Platform Adaptation Layer DLL
|
| | windows.staterepository.dll | 6.2.10240.16384 | Windows StateRepository API Server
|
| | windows.staterepositorybroker.dll | 6.2.10240.16384 | Windows StateRepository API Broker
|
| | windows.staterepositoryclient.dll | 6.2.10240.16384 | Windows StateRepository API Broker
|
| | windows.storage.applicationdata.dll | 6.2.10240.16384 | Windows Application Data API Server
|
| | windows.storage.compression.dll | 6.2.10240.16384 | WinRT Compression
|
| | windows.storage.dll | 6.2.10240.16405 | Microsoft WinRT Storage API
|
| | windows.storage.search.dll | 6.2.10240.16384 | Windows.Storage.Search
|
| | windows.system.diagnostics.dll | 6.2.10240.16384 | Windows System Diagnostics DLL
|
| | windows.system.launcher.dll | 6.2.10240.16384 | Windows.System.Launcher
|
| | windows.system.profile.hardwareid.dll | 6.2.10240.16384 | Windows System Profile HardwareId DLL
|
| | windows.system.profile.retailinfo.dll | 6.2.10240.16384 | Windows.System.Profile.RetailInfo Runtime DLL
|
| | windows.system.profile.systemmanufacturers.dll | 6.2.10240.16384 | Windows.System.Profile.SystemManufacturers
|
| | windows.system.remotedesktop.dll | 6.2.10240.16384 | Windows System RemoteDesktop Runtime DLL
|
| | windows.system.systemmanagement.dll | 6.2.10240.16384 | Windows Runtime SystemManagement DLL
|
| | windows.ui.biofeedback.dll | 6.2.10240.16386 | Bio Feedback User Experience
|
| | windows.ui.blockedshutdown.dll | 6.2.10240.16386 | Blocked Shutdown User Experience
|
| | windows.ui.core.textinput.dll | 6.2.10240.16431 | Windows.UI.Core.TextInput dll
|
| | windows.ui.cred.dll | 6.2.10240.16391 | Credential Prompt User Experience
|
| | windows.ui.dll | 6.2.10240.16384 | Windows Runtime UI Foundation DLL
|
| | windows.ui.immersive.dll | 6.2.10240.16397 | WINDOWS.UI.IMMERSIVE
|
| | windows.ui.input.inking.dll | 6.2.10240.16384 | WinRT Windows Inking DLL
|
| | windows.ui.logon.dll | 6.2.10240.16431 | Logon User Experience
|
| | windows.ui.search.dll | 6.2.10240.16386 | Windows.UI.Search
|
| | windows.ui.xaml.dll | 6.2.10240.16431 | Windows.UI.Xaml dll
|
| | windows.ui.xaml.maps.dll | 6.2.10240.16384 | Windows UI XAML Maps API
|
| | windows.ui.xaml.phone.dll | 6.2.10240.16384 | Windows UI XAML Phone API
|
| | windows.ui.xaml.resources.dll | 6.2.10240.16384 | Windows.UI.Xaml.Resources dll
|
| | windows.web.diagnostics.dll | 6.2.10240.16384 | Windows.Web.Diagnostics
|
| | windows.web.dll | 6.2.10240.16384 | Web Client DLL
|
| | windows.web.http.dll | 6.2.10240.16384 | Windows.Web.Http DLL
|
| | windowscodecs.dll | 6.2.10240.16384 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 6.2.10240.16384 | Microsoft Windows Codecs Extended Library
|
| | windowscodecsraw.dll | 6.2.10240.16384 | Microsoft Camera Codec Pack
|
| | windowslivelogin.dll | 6.2.10240.16384 | Microsoft® Account Login Helper
|
| | winfax.dll | 6.2.10240.16384 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 6.2.10240.16391 | Windows HTTP Services
|
| | wininet.dll | 11.0.10240.16391 | Internet Extensions for Win32
|
| | wininitext.dll | 6.2.10240.16384 | WinInit Utility Extension DLL
|
| | winipcfile.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services File API
|
| | winipcsecproc.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Desktop Security Processor
|
| | winipcsecproc_ssp.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Server Security Processor
|
| | winipsec.dll | 6.2.10240.16384 | Windows IPsec SPD Client DLL
|
| | winlangdb.dll | 6.2.10240.16384 | Windows Bcp47 Language Database
|
| | winmde.dll | 12.0.10240.16412 | WinMDE DLL
|
| | winmm.dll | 6.2.10240.16384 | MCI API DLL
|
| | winmmbase.dll | 6.2.10240.16384 | Base Multimedia Extension API DLL
|
| | winmsipc.dll | 6.2.10240.16384 | Microsoft Active Directory Rights Management Services Client
|
| | winmsoirmprotector.dll | 6.2.10240.16384 | Windows Office file format IRM Protector
|
| | winnlsres.dll | 6.2.10240.16384 | NLSBuild resource DLL
|
| | winnsi.dll | 6.2.10240.16384 | Network Store Information RPC interface
|
| | winopcirmprotector.dll | 6.2.10240.16384 | Windows Office file format IRM Protector
|
| | winrnr.dll | 6.2.10240.16384 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 6.2.10240.16384 | remtsvc
|
| | winrsmgr.dll | 6.2.10240.16384 | WSMan Shell API
|
| | winrssrv.dll | 6.2.10240.16384 | winrssrv
|
| | winrttracing.dll | 6.2.10240.16384 | Windows Diagnostics Tracing
|
| | winsatapi.dll | 6.2.10240.16384 | Windows System Assessment Tool API
|
| | winscard.dll | 6.2.10240.16384 | Microsoft Smart Card API
|
| | winshfhc.dll | 6.2.10240.16384 | File Risk Estimation
|
| | winsku.dll | 6.2.10240.16384 | Windows SKU Library
|
| | winsockhc.dll | 6.2.10240.16384 | Winsock Network Diagnostic Helper Class
|
| | winsqlite3.dll | 3.8.8.3 | SQLite is a software library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine.
|
| | winsrpc.dll | 6.2.10240.16384 | WINS RPC LIBRARY
|
| | winsta.dll | 6.2.10240.16384 | Winstation Library
|
| | winsync.dll | 2007.94.10240.16384 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.10240.16384 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.10240.16384 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 6.2.10240.16385 | Microsoft Trust Verification APIs
|
| | wintypes.dll | 6.2.10240.16384 | Windows Base Types DLL
|
| | winusb.dll | 6.2.10240.16384 | Windows USB Driver User Library
|
| | wisp.dll | 6.2.10240.16384 | Microsoft Pen and Touch Input Component
|
| | wkscli.dll | 6.2.10240.16384 | Workstation Service Client DLL
|
| | wkspbrokerax.dll | 6.2.10240.16384 | Microsoft Workspace Broker ActiveX Control
|
| | wksprtps.dll | 6.2.10240.16384 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 6.2.10240.16384 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 6.2.10240.16384 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 6.2.10240.16384 | Dot11 Connection Flows
|
| | wlandlg.dll | 6.2.10240.16384 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 6.2.10240.16384 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlanmm.dll | 6.2.10240.16384 | Dot11 Media and AdHoc Managers
|
| | wlanmsm.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 6.2.10240.16384 | Wireless Preferred Networks
|
| | wlansec.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 6.2.10240.16384 | Wireless Profile UI
|
| | wlanutil.dll | 6.2.10240.16384 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 6.2.10240.16384 | Win32 LDAP API DLL
|
| | wldp.dll | 6.2.10240.16384 | Windows Lockdown Policy
|
| | wlgpclnt.dll | 6.2.10240.16384 | 802.11 Group Policy Client
|
| | wlidcli.dll | 6.2.10240.16384 | Microsoft® Account Dynamic Link Library
|
| | wlidcredprov.dll | 6.2.10240.16384 | Microsoft® Account Credential Provider
|
| | wlidfdp.dll | 6.2.10240.16384 | Microsoft® Account Function Discovery Provider
|
| | wlidnsp.dll | 6.2.10240.16384 | Microsoft® Account Namespace Provider
|
| | wlidprov.dll | 6.2.10240.16384 | Microsoft® Account Provider
|
| | wlidres.dll | 6.2.10240.16384 | Microsoft® Windows Live ID Resource
|
| | wls0wndh.dll | 6.2.10240.16384 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 6.2.10240.16384 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 6.2.10240.16384 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.10240.16384 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 6.2.10240.16384 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.10240.16384 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.10240.16384 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.10240.16384 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.10240.16384 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.10240.16384 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.10240.16384 | Windows Media Error Definitions (English)
|
| | wmi.dll | 6.2.10240.16384 | WMI DC and DP functionality
|
| | wmiclnt.dll | 6.2.10240.16384 | WMI Client API
|
| | wmidcom.dll | 6.2.10240.16384 | WMI
|
| | wmidx.dll | 12.0.10240.16384 | Windows Media Indexer DLL
|
| | wmiprop.dll | 6.2.10240.16384 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmitomi.dll | 6.2.10240.16384 | CIM Provider Adapter
|
| | wmnetmgr.dll | 12.0.10240.16384 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.10240.16397 | Windows Media Player
|
| | wmpdui.dll | 12.0.10240.16384 | Windows Media Player UI Engine
|
| | wmpdxm.dll | 12.0.10240.16384 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.10240.16384 | Windows Media Player Effects
|
| | wmphoto.dll | 6.2.10240.16384 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.10240.16384 | Windows Media Player Resources
|
| | wmpps.dll | 12.0.10240.16384 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.10240.16384 | Windows Media Player Launcher
|
| | wmsgapi.dll | 6.2.10240.16384 | WinLogon IPC Client
|
| | wmspdmod.dll | 6.2.10240.16384 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 6.2.10240.16384 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.10240.16384 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 6.2.10240.16384 | Windows Media Video Decoder
|
| | wmvdspa.dll | 6.2.10240.16384 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 6.2.10240.16384 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 6.2.10240.16384 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 6.2.10240.16384 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 6.2.10240.16384 | Windows Media Video Encoder
|
| | wofutil.dll | 6.2.10240.16384 | Windows Overlay File System Filter user mode API
|
| | wordbreakers.dll | |
|
| | workfoldersres.dll | 6.2.9200.16384 | Work Folders Resources
|
| | wow32.dll | 6.2.10240.16384 | Wow32
|
| | wpbcreds.dll | 6.2.10240.16384 | WP 8.1 upgrade support utility
|
| | wpc.dll | 6.2.10240.16384 | WPC Settings Library
|
| | wpdshext.dll | 6.2.10240.16384 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 6.2.10240.16384 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 6.2.10240.16384 | WMDM Service Provider for Windows Portable Devices
|
| | wpkbdlayout.dll | |
|
| | wpnapps.dll | 6.2.10240.16412 | Windows Push Notification Apps
|
| | wpportinglibrary.dll | 6.2.10240.16384 | <d> DLL
|
| | ws2_32.dll | 6.2.10240.16384 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 6.2.10240.16384 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 6.2.10240.16384 | Windows Security Center API
|
| | wscinterop.dll | 6.2.10240.16384 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 6.2.10240.16384 | Windows Security Center ISV API
|
| | wsclient.dll | 6.2.10240.16384 | Windows Store Licensing Client
|
| | wscproxystub.dll | 6.2.10240.16384 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 6.2.10240.16384 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 6.2.10240.16384 | WSD Challenge Component
|
| | wsecedit.dll | 6.2.10240.16384 | Security Configuration UI Module
|
| | wshbth.dll | 6.2.10240.16384 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.812.10240.16384 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 6.2.10240.16384 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.812.10240.16384 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 6.2.10240.16384 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 6.2.10240.16384 | Windows Sockets Helper DLL
|
| | wshqos.dll | 6.2.10240.16384 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 6.2.10240.16384 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 6.2.10240.16384 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmagent.dll | 6.2.10240.16384 | WinRM Agent
|
| | wsmanmigrationplugin.dll | 6.2.10240.16384 | WinRM Migration Plugin
|
| | wsmauto.dll | 6.2.10240.16384 | WSMAN Automation
|
| | wsmplpxy.dll | 6.2.10240.16384 | wsmplpxy
|
| | wsmres.dll | 6.2.10240.16384 | WSMan Resource DLL
|
| | wsmsvc.dll | 6.2.10240.16384 | WSMan Service
|
| | wsmwmipl.dll | 6.2.10240.16384 | WSMAN WMI Provider
|
| | wsnmp32.dll | 6.2.10240.16384 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 6.2.10240.16384 | Windows Socket 32-Bit DLL
|
| | wsp_fs.dll | 6.2.10240.16384 | Windows Storage Provider for FileShare management
|
| | wsp_health.dll | 6.2.10240.16384 | Windows Storage Provider for Health Agent API
|
| | wsp_sr.dll | 6.2.10240.16384 | Windows Storage Provider for Storage Replication management
|
| | wsshared.dll | 6.2.10240.16384 | WSShared DLL
|
| | wssync.dll | 6.2.10240.16384 | Windows Store Licensing Sync Client
|
| | wtsapi32.dll | 6.2.10240.16384 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 6.2.10240.16397 | Windows Update Client API
|
| | wudriver.dll | 6.2.10240.16384 | Windows Update WUDriver Stub
|
| | wups.dll | 6.2.10240.16384 | Windows Update client proxy stub
|
| | wvc.dll | 6.2.10240.16384 | Windows Visual Components
|
| | wwaapi.dll | 6.2.10240.16384 | Microsoft Web Application Host API library
|
| | wwaext.dll | 6.2.10240.16384 | Microsoft Web Application Host Extension library
|
| | wwanapi.dll | 6.2.10240.16384 | Mbnapi
|
| | wwapi.dll | 8.1.10240.16384 | WWAN API
|
| | xamldiagnostics.dll | 6.2.10240.16384 | Xaml Diagnostics
|
| | xaudio2_8.dll | 6.2.10240.16384 | XAudio2 Game Audio API
|
| | xaudio2_9.dll | 6.2.10240.16384 | XAudio2 Game Audio API
|
| | xblauthmanagerproxy.dll | 6.2.10240.16384 | XblAuthManagerProxy
|
| | xblauthtokenbrokerext.dll | 6.2.10240.16384 | Xbox Live Token Broker Extension
|
| | xblgamesaveproxy.dll | 6.2.10240.16384 | Xbox Connected Storage Service Proxies and Stubs
|
| | xinput1_4.dll | 6.2.10240.16384 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 6.2.10240.16384 | XNA Common Controller
|
| | xinputuap.dll | 6.2.10240.16384 | Microsoft Common Controller API
|
| | xmlfilter.dll | 2008.0.10240.16384 | XML Filter
|
| | xmllite.dll | 6.2.10240.16384 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 6.2.10240.16384 | Network Provisioning Service Client API
|
| | xolehlp.dll | 2001.12.10941.16384 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsdocumenttargetprint.dll | 6.2.10240.16384 | XPS DocumentTargetPrint DLL
|
| | xpsfilt.dll | 6.2.10240.16384 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 6.2.10240.16384 | XPS to GDI Converter
|
| | xpsprint.dll | 6.2.10240.16384 | XPS Printing DLL
|
| | xpsrasterservice.dll | 6.2.10240.16384 | XPS Rasterization Service Component
|
| | xpsservices.dll | 6.2.10240.16384 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 6.2.10240.16384 | OPC Shell Metadata Handler
|
| | xwizards.dll | 6.2.10240.16384 | Extensible Wizards Manager Module
|
| | xwreg.dll | 6.2.10240.16384 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 6.2.10240.16384 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 6.2.10240.16384 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 6.2.10240.16384 | Compressed (zipped) Folders
|
| | ztrace_ca.dll | 6.2.10240.16384 | Ztrace_ca DLL
|
| | ztrace_maps.dll | 6.2.10240.16384 | ZTrace Event Resources
|
| | | | | | | |
|
| | Log Name | Event Type | Category | Generated On | User | Source | Description
|
| | Application | Warning | 3 | 2015-08-20 20:03:33 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-1877548631-935440309-1602752157-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | 3 | 2015-08-20 23:55:44 | | Windows Search Service | 10023: The protocol host process 7420 did not respond and is being forcibly terminated {filter host process 6760}.
|
| | Application | Warning | None | 2015-08-21 00:25:19 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | None | 2015-08-21 00:25:25 | | DptfParticipantWirelessService | 2:
|
| | Application | Error | None | 2015-08-21 00:25:25 | | DptfParticipantWirelessService | 1:
|
| | Application | Error | None | 2015-08-21 00:25:25 | | DptfParticipantWirelessService | 1:
|
| | Application | Warning | 3 | 2015-08-21 01:26:13 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-1877548631-935440309-1602752157-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | None | 2015-08-21 01:27:12 | | Wlclntfy | 6001: The winlogon notification subscriber <Sens> failed a notification event.
|
| | Application | Error | None | 2015-08-21 01:28:58 | | DptfParticipantWirelessService | 2:
|
| | Application | Error | None | 2015-08-21 01:28:58 | | DptfParticipantWirelessService | 1:
|
| | Application | Error | None | 2015-08-21 01:28:58 | | DptfParticipantWirelessService | 1:
|
| | Application | Warning | None | 2015-08-21 01:29:01 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | None | 2015-08-21 01:29:25 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-21 01:29:25 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-21 01:29:25 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x8007139F Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2015-08-21 01:29:42 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-21 01:29:42 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-21 01:29:42 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0xC004C003 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Warning | None | 2015-08-21 01:31:04 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | 5973 | 2015-08-21 02:19:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:19:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:19:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:19:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:01 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:08 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:08 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:09 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:09 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:09 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:09 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:10 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:10 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:10 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:10 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:10 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:11 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:11 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:11 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:11 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:12 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:12 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:12 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:12 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:13 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:13 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:13 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:13 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:13 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:14 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:14 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:14 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:14 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:15 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:15 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:15 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:15 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:15 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:16 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:16 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:16 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:16 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:17 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:17 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:17 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:17 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:18 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:18 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:18 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:18 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:38 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:38 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:38 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:38 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:39 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:39 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:39 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:39 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:40 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:40 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:43 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:43 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:43 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:43 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:43 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:44 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:44 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:44 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:44 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:45 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:45 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:45 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:45 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:46 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:46 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:46 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:46 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:47 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:47 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:47 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:47 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:20:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:07 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:07 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:07 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:21:07 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 02:24:11 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:48 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:49 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:50 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:53 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:54 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:55 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:56 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:57 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:58 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:09:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:01 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:01 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:01 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:01 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:05 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-21 12:10:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-08-21 17:17:42 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Warning | 3 | 2015-08-22 00:25:37 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-1877548631-935440309-1602752157-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Warning | None | 2015-08-22 00:25:43 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Warning | 2 | 2015-08-22 00:26:47 | galff | Handwriting Recognition | 110:
|
| | Application | Warning | None | 2015-08-22 01:28:44 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | None | 2015-08-22 01:29:42 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-22 01:29:42 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-22 01:29:44 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-22 01:29:44 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-22 01:29:45 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0xC004C003 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=TimerEvent
|
| | Application | Error | 5973 | 2015-08-22 01:44:51 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:44:52 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2147023170 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:44:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:44:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:44:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:44:59 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:00 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2147023170 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:02 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:03 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:04 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:06 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Error | 5973 | 2015-08-22 01:45:08 | galff | Microsoft-Windows-Immersive-Shell | 5973: Activation of app Microsoft.LockApp_cw5n1h2txyewy!WindowsDefaultLockScreen failed with error: -2144927141 See the Microsoft-Windows-TWinUI/Operational log for additional information.
|
| | Application | Warning | None | 2015-08-23 13:21:57 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Warning | 3 | 2015-08-23 13:21:58 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-1877548631-935440309-1602752157-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Error | None | 2015-08-23 13:22:01 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-23 13:22:01 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Warning | 3 | 2015-08-23 15:21:54 | | Windows Search Service | 10023: The protocol host process 8528 did not respond and is being forcibly terminated {filter host process 6052}.
|
| | Application | Error | None | 2015-08-27 16:42:44 | | DptfParticipantWirelessService | 2:
|
| | Application | Error | None | 2015-08-27 16:42:44 | | DptfParticipantWirelessService | 1:
|
| | Application | Error | None | 2015-08-27 16:42:44 | | DptfParticipantWirelessService | 1:
|
| | Application | Warning | None | 2015-08-27 16:43:24 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | None | 2015-08-27 16:43:34 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0x80072EE7
|
| | Application | Error | None | 2015-08-27 16:43:34 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0x80072EE7 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-27 16:43:37 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0x80072EE7 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=UserLogon;SessionId=1
|
| | Application | Warning | 3 | 2015-08-27 16:43:38 | | Windows Search Service | 3036: Crawl could not be completed on content source <winrt://{S-1-5-21-1877548631-935440309-1602752157-1001}/>. Context: Application, SystemIndex Catalog Details: The parameter is incorrect. (HRESULT : 0x80070057) (0x80070057)
|
| | Application | Error | 100 | 2015-08-27 16:44:04 | | Application Error | 1000: Faulting application name: svchost.exe_Wcmsvc, version: 10.0.10240.16384, time stamp: 0x559f38cb Faulting module name: SubscriptionMgr.dll, version: 10.0.10240.16425, time stamp: 0x55bec160 Exception code: 0xe0464645 Fault offset: 0x000000000000a7ef Faulting process id: 0x48c Faulting application start time: 0x01d0e0ce3a617286 Faulting application path: C:\Windows\system32\svchost.exe Faulting module path: C:\Windows\system32\SubscriptionMgr.dll Report Id: d2b8c538-0a4c-445c-a182-61e13f809e7c Faulting package full name: Faulting package-relative application ID:
|
| | Application | Error | None | 2015-08-27 16:44:07 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-27 16:44:07 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-27 16:44:15 | | Software Protection Platform Service | 8200: License acquisition failure details. hr=0xC004C003
|
| | Application | Error | None | 2015-08-27 16:44:15 | | Software Protection Platform Service | 1014: Acquisition of End User License failed. hr=0xC004C003 Sku Id=0567073a-7d74-403b-b2d5-6b35da372d8d
|
| | Application | Error | None | 2015-08-27 16:44:15 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0xC004E028 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | None | 2015-08-27 16:44:18 | | Software Protection Platform Service | 8198: License Activation (slui.exe) failed with the following error code: hr=0xC004C003 Command-line arguments: RuleId=31e71c49-8da7-4a2f-ad92-45d98a1c79ba;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=0567073a-7d74-403b-b2d5-6b35da372d8d;NotificationInterval=1440;Trigger=NetworkAvailable
|
| | Application | Error | 1 | 2015-08-27 16:44:39 | | ESENT | 490: SettingSyncHost (6268) {FF293C80-59F1-4839-B025-E2C6199C04F4}: An attempt to open the file "C:\Users\galff\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log" for read / write access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:44:39 | | ESENT | 455: SettingSyncHost (6268) {FF293C80-59F1-4839-B025-E2C6199C04F4}: Error -1032 (0xfffffbf8) occurred while opening logfile C:\Users\galff\AppData\Local\Microsoft\Windows\SettingSync\metastore\edb.log.
|
| | Application | Error | 1 | 2015-08-27 16:44:50 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:44:50 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:45:00 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:00 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:45:11 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:11 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:45:21 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:21 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:45:31 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:31 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:45:42 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:42 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Warning | None | 2015-08-27 16:45:44 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Error | 1 | 2015-08-27 16:45:55 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:45:58 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:46:10 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:46:10 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:46:21 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:46:21 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Error | 1 | 2015-08-27 16:46:31 | | ESENT | 488: SettingSyncHost (6268) An attempt to create the file "C:\Windows\system32\edbtmp.log" failed with system error 5 (0x00000005): "Access is denied. ". The create file operation will fail with error -1032 (0xfffffbf8).
|
| | Application | Error | 3 | 2015-08-27 16:46:31 | | ESENT | 413: SettingSyncHost (6268) Unable to create a new logfile because the database cannot write to the log drive. The drive may be read-only, out of disk space, misconfigured, or corrupted. Error -1032.
|
| | Application | Warning | None | 2015-08-27 17:05:46 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Warning | None | 2015-08-27 17:15:08 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Application | Warning | None | 2015-08-27 17:52:19 | | Software Protection Platform Service | 1058: Installation of the Proof of Purchase from the ACPI table failed. Error code: 0xC004E016
|
| | Security | Audit Success | 12544 | 2015-08-20 20:03:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-20 20:03:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:04 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x150 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:04 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x15c New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x150 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2015-08-21 00:25:04 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:06 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1c4 New Process Name: ??????????????-??6??0?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x150 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:10 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1fc New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1c4 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x240 New Process Name: ??????????????-??6??0?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x150 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x248 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1c4 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x250 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x240 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x29c New Process Name: ????????????????-??6??0?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x240 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2d4 New Process Name: ????????????????-??6??8?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x248 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2e8 New Process Name: ????????????????-??6??8?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x248 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2f8 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x248 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2015-08-21 00:25:11 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x923a
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1060e Linked Logon ID: 0x10620 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x10620 Linked Logon ID: 0x1060e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1060e Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x10620 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 101 | 2015-08-21 00:25:18 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-544 Account Domain: Builtin Old Account Name: Administrators New Account Name: Administrators Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-545 Account Domain: Builtin Old Account Name: Users New Account Name: Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-546 Account Domain: Builtin Old Account Name: Guests New Account Name: Guests Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-558 Account Domain: Builtin Old Account Name: Performance Monitor Users New Account Name: Performance Monitor Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-559 Account Domain: Builtin Old Account Name: Performance Log Users New Account Name: Performance Log Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-562 Account Domain: Builtin Old Account Name: Distributed COM Users New Account Name: Distributed COM Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-568 Account Domain: Builtin Old Account Name: IIS_IUSRS New Account Name: IIS_IUSRS Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-573 Account Domain: Builtin Old Account Name: Event Log Readers New Account Name: Event Log Readers Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-580 Account Domain: Builtin Old Account Name: Remote Management Users New Account Name: Remote Management Users Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-32-581 Account Domain: Builtin Old Account Name: System Managed Accounts Group New Account Name: System Managed Accounts Group Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: Administrator Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x211 New UAC Value: 0x211 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: Guest Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: DefaultAccount Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: DefaultAccount Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x215 New UAC Value: 0x215 User Account Control: - User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4781: The name of an account was changed: Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-513 Account Domain: LAPTOP-5DNN8R19 Old Account Name: None New Account Name: None Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Changed Attributes: SAM Account Name: Administrators SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Changed Attributes: SAM Account Name: Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Changed Attributes: SAM Account Name: Guests SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Monitor Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Changed Attributes: SAM Account Name: Performance Log Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Changed Attributes: SAM Account Name: Distributed COM Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Changed Attributes: SAM Account Name: IIS_IUSRS SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Changed Attributes: SAM Account Name: Event Log Readers SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Changed Attributes: SAM Account Name: Remote Management Users SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4735: A security-enabled local group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Changed Attributes: SAM Account Name: System Managed Accounts Group SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4737: A security-enabled global group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-21-1877548631-935440309-1602752157-513 Group Name: None Group Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:18 | | Microsoft-Windows-Security-Auditing | 4737: A security-enabled global group was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-21-1877548631-935440309-1602752157-513 Group Name: None Group Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: None SID History: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x49c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x530 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-08-21 00:25:24 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x31193 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-08-21 00:25:26 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 13568 | 2015-08-21 00:25:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\Temp\winre\ExtractedFromWim Handle ID: 0x978 Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:28 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:28 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:32 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:43 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:25:56 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57c2b Linked Logon ID: 0x57c51 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe Network Information: Workstation Name: LAPTOP-OMGARQRN Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57c51 Linked Logon ID: 0x57c2b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe Network Information: Workstation Name: LAPTOP-OMGARQRN Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57c51 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57c2b Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57c2b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4720: A user account was created. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 New Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Attributes: SAM Account Name: defaultuser0 Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 Allowed To Delegate To: - Old UAC Value: 0x0 New UAC Value: 0x15 User Account Control: %%2080 %%2082 %%2084 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4722: A user account was enabled. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: defaultuser0 Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x15 New UAC Value: 0x14 User Account Control: %%2048 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: defaultuser0 Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 8/21/2015 12:25:57 AM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x14 User Account Control: - User Parameters: - SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4724: An attempt was made to reset an account's password. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: defaultuser0 Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: 8/21/2015 12:25:57 AM Account Expires: %%1794 Primary Group ID: 513 AllowedToDelegateTo: - Old UAC Value: 0x14 New UAC Value: 0x214 User Account Control: %%2089 User Parameters: - SID History: - Logon Hours: %%1797 Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4724: An attempt was made to reset an account's password. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: defaultuser0 Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4728: A member was added to a security-enabled global group. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: - Group: Security ID: S-1-5-21-1877548631-935440309-1602752157-513 Group Name: None Group Domain: LAPTOP-5DNN8R19 Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4732: A member was added to a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: - Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4733: A member was removed from a security-enabled local group. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Member: Security ID: S-1-5-21-1877548631-935440309-1602752157-1000 Account Name: - Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x16c Process Name: C:\Windows\System32\oobe\msoobe.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 00:25:57 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x530 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:26:04 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 00:26:13 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-21 00:26:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 00:26:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-21 00:26:16 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-OMGARQRN$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xc74 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x150 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb63363 Linked Logon ID: 0xb6339d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x150 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb6339d Linked Logon ID: 0xb63363 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x150 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2f4 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb63700 Linked Logon ID: 0xb63868 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2f4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb63868 Linked Logon ID: 0xb63700 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2f4 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0xb6339d Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0xb63363 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0xb63868 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0xb63700 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb63363 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0xb63700 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 01:26:45 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-08-21 01:27:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d4 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:27:12 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x19cbb1 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:27:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\ntdll.dll Handle ID: 0x3c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\ntoskrnl.exe Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\drivers\storport.sys Handle ID: 0x40 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\ntdll.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_21ffbdd2a2dd92e0.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_speech_onecore_common_3ac1627a1b848769.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_oobe_1bf24c07bb30ce37.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_en-us_9e576ab077991fe8.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_syswow64_dism_1bf2381fbb30eb13.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemresources_0307ca33e1cd9708.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemresources_windows.ui.settingsappthreshold_0b97cbddb6bef8ee.cdf-ms Handle ID: 0x54 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemresources_windows.ui.logon_ed8ece16fb61b4e6.cdf-ms Handle ID: 0x54 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_windowsfeedback_cw5n1h2txyewy_e32424584539397a.cdf-ms Handle ID: 0x54 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_shellexperiencehost_cw5n1h2txyewy_e21c90d9487ed242.cdf-ms Handle ID: 0x54 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.windows.cortana_cw5n1h2txyewy_2d6b8920d3f31e0d.cdf-ms Handle ID: 0x44 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.windows.cortana_cw5n1h2txyewy_views_a56f518aba6f0a4b.cdf-ms Handle ID: 0x44 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.windows.contentdeliverymanager_cw5n1h2txyewy_6369fdd3e5ab0989.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.microsoftedge_8wekyb3d8bbwe_43d095bdcce4e130.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.lockapp_cw5n1h2txyewy_6f26550558264bb4.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.bioenrollment_cw5n1h2txyewy_0e6f6a5d1f5a1430.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_microsoft.aad.brokerplugin_cw5n1h2txyewy_d48a5fb790740a92.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:23 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_systemapps_contactsupport_cw5n1h2txyewy_9f20cf1a0d04fca1.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_21f9a9c4a2f8b514.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_winbioplugins_071a28c5b510fb6a.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_systemresetplatform_14fecc2716acccef.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_spp_tokens_ppdlic_0f09ba294211a24b.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_speech_onecore_common_60bf750299e8ab15.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_oobe_06655c95df2fa06f.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_migration_927a21df1acd7c18.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_en-us_429cd25484dc6f94.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_drivers_dc1b782427b5ee1b.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_drivers_umdf_a531b5dc588477d3.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_drivers_en-us_4bb913fc5eb96bcf.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_dism_066548addf2fbd4b.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_boot_06654401df2fc50e.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_system32_appraiser_59bebec9f06db09b.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_resources_fbee56ab048ab239.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_resources_themes_4d0d4910e83c2273.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_resources_themes_aero_3fd78bf4cb5fa2c4.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_purchasedialog_bf454dd5e78ab123.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_provisioning_cc9458acec1840ff.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_3296b36dbe4c7fa3.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework64_083d4e330e766c5d.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework64_v4.0.30319_46321ba736a30085.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework64_v3.0_d97e7188b51e6116.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework64_v3.0_wpf_f80a7f17f38f3771.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework_83386eac0379231b.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework_v4.0.30319_c40c7a995ddd757b.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_microsoft.net_framework_v3.0_wpf_b56a2354fbfa0c31.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_inf_3f581daba4c8c835.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_immersivecontrolpanel_1e6ccf0e6a91b570.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_globalization_0fc22903a221b67f.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_globalization_sorting_04883de290c6ef1b.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_devicesflow_a24e4906c4ce494f.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_boot_40104b85a18bfcb2.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_boot_pcat_0f8924c0debe64e4.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_boot_efi_0f890f82be247f42.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_apppatch_1143992cbbbebcab.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_apppatch_apppatch64_e39bab3b20714e20.cdf-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\programdata.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\programdata_microsoft_fe5c6d762edd2110.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\programdata_microsoft_user_account_pictures_eceaafe818cb6141.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86__676bbe2c7241b694.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_reference_assemblies_41115a5fd4566dab.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_reference_assemblies_microsoft_ad470207ad610db1.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_reference_assemblies_microsoft_framework_b81ea2cfde84fb19.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_reference_assemblies_microsoft_framework_v3.0_1dfad1527dc1078c.cdf-ms Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_internet_explorer_cafab575245eacb0.cdf-ms Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_common_files_dfa3680ec228c528.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_common_files_microsoft_shared_635c287ec97ec0a5.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_x86_common_files_microsoft_shared_vgx_9d0cc8bc56d58860.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_ffd0cbfc813cc4f1.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_reference_assemblies_f89c5a39d351281a.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_reference_assemblies_microsoft_a4ba21b6f468ca9e.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_reference_assemblies_microsoft_framework_61efdd9e2d0263ca.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_reference_assemblies_microsoft_framework_v3.0_44577d982216c291.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_internet_explorer_a421d1bfaf856e2b.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_common_files_d7a65bb2f0e854e7.cdf-ms Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_common_files_microsoft_shared_818c5a0e45020fba.cdf-ms Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_common_files_microsoft_shared_vgx_3c86fd9f0b3afd9b.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\program_files_common_files_microsoft_shared_ink_3c86e3db0b3b254c.cdf-ms Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\ProgramData\Microsoft\User Account Pictures\guest.bmp Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\ProgramData\Microsoft\User Account Pictures\user.bmp Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\explorer.exe Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\AppPatch\drvmain.sdb Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\AppPatch\sysmain.sdb Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\AppPatch\apppatch64\sysmain.sdb Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\DevicesFlow\DevicesFlowUI.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:24 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\MbaeApiPublic.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\MbaeParserTask.exe Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mfcore.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\MFMediaEngine.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mfplat.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mfps.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mfsvr.dll Handle ID: 0x68 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mshtml.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mssprxy.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\mssrch.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\NetworkMobileSettings.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\OneDriveSettingSyncProvider.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\rdbui.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\RDXService.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\ReAgent.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\RemoteNaturalLanguage.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\SearchProtocolHost.exe Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\SettingsHandlers_Notifications.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll Handle ID: 0x40 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\AppXDeploymentClient.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\AppXDeploymentExtensions.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\AppXDeploymentServer.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\atmfd.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\atmlib.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Chakra.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\cloudAP.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\diagtrack.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\diagtrack_win.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\diagtrack_wininternal.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\directmanipulation.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\dwmcore.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\edgehtml.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\enterprisecsps.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\fontdrvhost.exe Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\GamePanel.exe Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\iertutil.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\InputService.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\LocationFramework.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\LocationFrameworkInternalPS.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\LocationGeofences.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\LocationPermissions.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\LockAppHost.exe Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:25 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\MbaeApi.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\syncutil.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\sysmain.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\tetheringclient.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\tetheringservice.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\TextInputFramework.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\tquery.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\UIAutomationCore.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\UserMgrProxy.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wcmsvc.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wifinetworkmanager.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\win32kbase.sys Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\win32kfull.sys Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Windows.ApplicationModel.Store.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Windows.ApplicationModel.Store.TestingFramework.dll Handle ID: 0x4c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Windows.UI.Logon.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\Windows.UI.Xaml.dll Handle ID: 0x74 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wlidsvc.dll Handle ID: 0x74 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wuautoappupdate.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\wwansvc.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\appraiser\appraiser.sdb Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\spp\tokens\ppdlic\explorer-ppdlic.xrm-ms Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\WinBioPlugIns\FaceRecognitionEngineAdapter.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\System32\WinBioPlugIns\FaceRecognitionSensorAdapter.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AddressBand.xbf Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eModel.dll Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\eView.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\F12App2.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\HubPanel.xbf Handle ID: 0x50 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\ContentDeliveryManager.Background.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\ContentManagementSDK.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\BingIdentityManagerInternal.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\CGSVCBackgroundTask.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.Actions.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.AppToApp.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.BackgroundTask.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.BackgroundTask.winmd Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.ContactPermissions.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.IntentExtraction.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.Reminders.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.SmartExtraction.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.Sync.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Cortana.UI.winmd Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\CortanaApi.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\CortanaSpeechux.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\PlacesServer.exe Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\PPIVoiceAgents.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\ReactiveAgentsCommon.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\RemindersUI.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\RulesBackgroundTasks.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\RulesService.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SAPIBackgroundTask.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\tws.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\VoiceAgentsCommon.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\BatteryFlyoutExperience.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ClockFlyoutExperience.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\DevicesFlowUI.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\JumpviewUI.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\MtcUvc.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\NetworkUX.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\QuickConnectUI.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources.pri Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\StartUI.dll Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\Windows.UI.ActionCenter.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\SystemResources\Windows.UI.Logon\Windows.UI.Logon.pri Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\AppXDeploymentClient.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\atmfd.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:26 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\atmlib.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Chakra.dll Handle ID: 0x74 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\directmanipulation.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\dwmcore.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\edgehtml.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\explorer.exe Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\fontdrvhost.exe Handle ID: 0x48 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\GamePanel.exe Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\iertutil.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\InputService.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\LockAppHost.exe Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\MbaeApi.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\MbaeApiPublic.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\mfcore.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\MFMediaEngine.dll Handle ID: 0x78 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\mfplat.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\mfsvr.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\mshtml.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\mssrch.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\OneDriveSettingSyncProvider.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\ReAgent.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\ReInfo.dll Handle ID: 0x58 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\RemoteNaturalLanguage.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\SearchProtocolHost.exe Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\tetheringclient.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\TextInputFramework.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\tquery.dll Handle ID: 0x64 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\UIAutomationCore.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\UserMgrProxy.dll Handle ID: 0x5c Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Windows.ApplicationModel.Store.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Windows.ApplicationModel.Store.TestingFramework.dll Handle ID: 0x30 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Windows.UI.Core.TextInput.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Windows.UI.Logon.dll Handle ID: 0x34 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:27:27 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\syswow64\Windows.UI.Xaml.dll Handle ID: 0x68 Process Information: Process ID: 0xb54 Process Name: C:\Windows\System32\poqexec.exe Auditing Settings: Original Security Descriptor: S:AI New Security Descriptor: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
|
| | Security | Audit Success | 103 | 2015-08-21 01:28:16 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:34 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x140 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:34 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x14c New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x140 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2015-08-21 01:28:34 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:35 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1ac New Process Name: ??????????????-??6??0?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x140 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:46 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x200 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1ac Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x248 New Process Name: ??????????????-??6??0?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x140 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x250 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1ac Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x258 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x248 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:49 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x29c New Process Name: ????????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x248 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-08-21 01:28:50 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2d0 New Process Name: ????????????????-??6??0?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x250 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-21 01:28:50 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2d8 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x250 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2015-08-21 01:28:50 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x8ba9
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f2b Linked Logon ID: 0x12f5b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f5b Linked Logon ID: 0x12f2b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f2b Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f5b Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-21 01:28:52 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:53 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:53 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-08-21 01:28:57 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x28156 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-21 01:28:58 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x61c Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12292 | 2015-08-21 01:29:00 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x370 Process Information: Process ID: 0x534 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16384_none_115fd2f761f7c508\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x4f4 Process Information: Process ID: 0x534 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16384_none_115fd2f761f7c508\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_servicing_fc2045b9046cc796.cdf-ms Handle ID: 0x57c Process Information: Process ID: 0x534 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16384_none_115fd2f761f7c508\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$_servicing_version_10.0.10240.16445_3c992a32fa8cfc96.cdf-ms Handle ID: 0x4f4 Process Information: Process ID: 0x534 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16384_none_115fd2f761f7c508\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xc34 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xc34 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xc34 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:19 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0xc34 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 01:29:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x484 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x781a7 Linked Logon ID: 0x781d7 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x781d7 Linked Logon ID: 0x781a7 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x7840b Linked Logon ID: 0x78433 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x78433 Linked Logon ID: 0x7840b Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x78433 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x7840b Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x781a7 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x7840b Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:36 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:45 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Failure | 12290 | 2015-08-21 01:29:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 01:29:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-21 01:29:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:29:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-21 01:29:47 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1510 Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 01:31:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:31:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-21 01:44:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1eba84 Linked Logon ID: 0x1ebb3a Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1ebb3a Linked Logon ID: 0x1eba84 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f5b Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x12f2b Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1eba84 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:51:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1ebb3a Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12544 | 2015-08-21 01:52:20 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:52:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f1fc9 Linked Logon ID: 0x1f20b4 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 01:52:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f20b4 Linked Logon ID: 0x1f1fc9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 01:52:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f1fc9 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 01:52:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f20b4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-21 01:52:43 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 01:52:43 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x24f97e Linked Logon ID: 0x24fb90 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x24fb90 Linked Logon ID: 0x24f97e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x29c Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f20b4 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1f1fc9 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x24f97e Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 02:12:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x24fb90 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 02:20:37 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf08 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 02:21:08 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf08 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 02:24:12 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf08 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 02:27:58 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf08 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 03:41:54 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf08 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f53ec Linked Logon ID: 0x2f5426 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f5426 Linked Logon ID: 0x2f53ec Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f5790 Linked Logon ID: 0x2f5812 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f5812 Linked Logon ID: 0x2f5790 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x2f5426 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x2f53ec Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x2f5812 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x2f5790 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f53ec Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x2f5790 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-21 11:42:18 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-08-21 11:57:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-21 11:57:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-21 12:10:07 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 12:17:16 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 12:21:16 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 12:25:16 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 12:28:00 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-21 12:40:23 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x138c Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Failure | 12290 | 2015-08-21 16:08:36 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 16:08:36 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 19:48:42 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 19:48:43 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 21:03:51 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 21:03:51 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 23:47:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-21 23:47:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 00:25:39 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 00:25:39 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-22 00:25:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x468349 Linked Logon ID: 0x468383 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x468383 Linked Logon ID: 0x468349 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x4688c0 Linked Logon ID: 0x468a7d Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x468a7d Linked Logon ID: 0x4688c0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x468383 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x468349 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x468a7d Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x4688c0 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x468349 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x4688c0 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-22 00:25:52 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Failure | 12290 | 2015-08-22 00:56:49 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 00:56:49 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 01:29:39 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 01:29:39 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 13824 | 2015-08-22 01:45:08 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x1ffc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 01:46:36 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x1ffc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 01:48:26 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x1ffc Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x5743b6 Linked Logon ID: 0x5743f0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x5743f0 Linked Logon ID: 0x5743b6 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x490 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x57483f Linked Logon ID: 0x57488e Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x57488e Linked Logon ID: 0x57483f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d8 Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x5743f0 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x5743b6 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57488e Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x57483f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x5743b6 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x57483f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-22 01:48:39 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13824 | 2015-08-22 02:15:13 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xd00 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 04:01:02 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xd00 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 04:04:14 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xd00 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 04:05:14 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xd00 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 13824 | 2015-08-22 04:12:13 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xd00 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Failure | 12290 | 2015-08-22 13:14:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 13:14:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-22 13:15:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-22 13:15:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-22 13:16:40 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-22 13:16:40 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-22 13:18:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-22 13:18:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-22 13:18:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-22 13:18:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-22 15:46:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 15:46:28 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 16:28:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 16:28:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 19:04:14 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-22 19:04:14 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 00:25:09 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 00:25:09 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 06:24:29 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 06:24:29 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 09:14:09 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 09:14:21 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 11:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 11:45:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 13:21:58 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 13:21:58 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-23 13:22:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2d0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-23 13:22:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-23 15:38:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 15:38:05 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 17:09:46 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 17:09:46 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 18:18:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 18:18:47 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 19:54:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 19:54:50 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 21:05:15 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 21:05:16 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 22:17:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-23 22:17:52 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-24 06:49:01 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-24 06:49:01 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-24 20:00:56 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-24 20:00:56 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:13 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x148 New Process Name: ??????????????-??6?4?????? ? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x4 Creator Process Name: ??????4 Process Command Line: ?????? ? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:13 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x154 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x148 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13573 | 2015-08-27 16:42:13 | | Microsoft-Windows-Security-Auditing | 4826: Boot Configuration Data loaded. Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 General Settings: Load Options: - Advanced Options: %%1843 Configuration Access Policy: %%1846 System Event Logging: %%1843 Kernel Debugging: %%1843 VSM Launch Type: %%1848 Signature Settings: Test Signing: %%1843 Flight Signing: %%1843 Disable Integrity Checks: %%1843 HyperVisor Settings: HyperVisor Load Options: - HyperVisor Launch Type: %%1848 HyperVisor Debugging: %%1843
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:21 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x1d0 New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x148 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:28 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x208 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1d0 Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x24c New Process Name: ??????????????-??6??8?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x148 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x254 New Process Name: ???????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x1d0 Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x260 New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ????????????????????4? Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:29 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2ac New Process Name: ????????????????-??6??c?????? ???????????????e?????? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x24c Creator Process Name: ????????????????????4 Process Command Line: ?????? ???????????????e?????? Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 12288 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 0 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: - New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2e0 New Process Name: ????????????????-??6??4?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x254 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2f4 New Process Name: ????????????????-??6??4?????? ???????????????????????4 Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x254 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13312 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4688: A new process has been created. Creator Subject: Security ID: S-1-5-18 Account Name: - Account Domain: - Logon ID: 0x3e7 Target Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Process Information: New Process ID: 0x2fc New Process Name: ??????????????e??? ?? Token Elevation Type: %%1936 Mandatory Label: S-1-16-16384 Creator Process ID: 0x254 Creator Process Name: ???????????????e?????? Process Command Line: ?????? ???????????????????????4 Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy. Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account. Type 2 is an elevated token with no privileges removed or groups disabled. An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator. An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group. Type 3 is a limited token with administrative privileges removed and administrative groups disabled. The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.
|
| | Security | Audit Success | 13568 | 2015-08-27 16:42:30 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x9020
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:31 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:31 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-1 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2ac Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1032f Linked Logon ID: 0x10359 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2ac Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x10359 Linked Logon ID: 0x1032f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2ac Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x1032f Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-1 Account Name: DWM-1 Account Domain: Window Manager Logon ID: 0x10359 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:33 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 101 | 2015-08-27 16:42:35 | | Microsoft-Windows-Eventlog | 1101: Audit events have been dropped by the transport. 0
|
| | Security | Audit Success | 13826 | 2015-08-27 16:42:35 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:36 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12292 | 2015-08-27 16:42:43 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-7 Account Name: ANONYMOUS LOGON Account Domain: NT AUTHORITY Logon ID: 0x29047 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-27 16:42:44 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-20 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e4 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x640 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 16:42:45 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xf4 Process Name: C:\Windows\System32\LogonUI.exe
|
| | Security | Audit Success | 12292 | 2015-08-27 16:42:54 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x34997 Linked Logon ID: 0x349c9 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 11 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x349c9 Linked Logon ID: 0x34997 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:43:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x34997 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-27 16:43:05 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x2fc Process Name: C:\Windows\System32\lsass.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x34c47 Linked Logon ID: 0x34c6f Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2fc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 7 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x34c6f Linked Logon ID: 0x34c47 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2fc Process Name: C:\Windows\System32\lsass.exe Network Information: Workstation Name: LAPTOP-5DNN8R19 Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Negotiat Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12545 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34c6f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12545 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34c47 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galffycsaba@gmail.com Account Domain: MicrosoftAccount Logon ID: 0x34c47 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13824 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4738: A user account was changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Target Account: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Changed Attributes: SAM Account Name: - Display Name: Gálffy Csaba User Principal Name: - Home Directory: - Home Drive: - Script Path: - Profile Path: - User Workstations: - Password Last Set: - Account Expires: - Primary Group ID: - AllowedToDelegateTo: - Old UAC Value: - New UAC Value: - User Account Control: - User Parameters: - SID History: - Logon Hours: - Additional Information: Privileges: -
|
| | Security | Audit Success | 13826 | 2015-08-27 16:43:06 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:43:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-27 16:43:09 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 16:43:10 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 13826 | 2015-08-27 16:43:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x184 Process Name: C:\Windows\System32\svchost.exe
|
| | Security | Audit Success | 12544 | 2015-08-27 16:43:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:43:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-27 16:43:23 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x12dc Process Name: C:\Windows\System32\SearchIndexer.exe
|
| | Security | Audit Success | 12544 | 2015-08-27 16:44:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:44:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-27 16:44:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 16:44:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Failure | 12290 | 2015-08-27 16:52:57 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 16:52:58 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:02:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:02:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:02:28 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:02:28 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: Administrator Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: DefaultAccount Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: Guest Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xe64 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: Administrator Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: DefaultAccount Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4797: An attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 Additional Information: Caller Workstation: LAPTOP-5DNN8R19 Target Account Name: Guest Target Account Domain: LAPTOP-5DNN8R19
|
| | Security | Audit Success | 13824 | 2015-08-27 17:11:36 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x349c9 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0xe64 Process Name: C:\Windows\explorer.exe
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:11:37 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:14:27 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:20 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:15:21 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:24:00 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:24:01 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-27 17:35:37 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 17:35:37 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-27 17:35:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 17:35:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13568 | 2015-08-27 17:35:45 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\_0000000000000000.cdf-ms Handle ID: 0x1868 Process Information: Process ID: 0x17c4 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16445_none_1161304761f67502\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 13568 | 2015-08-27 17:35:45 | | Microsoft-Windows-Security-Auditing | 4907: Auditing settings on object were changed. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Object: Object Server: Security Object Type: File Object Name: C:\Windows\WinSxS\FileMaps\$$.cdf-ms Handle ID: 0x18e0 Process Information: Process ID: 0x17c4 Process Name: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.10240.16445_none_1161304761f67502\TiWorker.exe Auditing Settings: Original Security Descriptor: New Security Descriptor: S:ARAI(AU;SAFA;0x1f0116;;;WD)
|
| | Security | Audit Success | 12288 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x478 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-08-27T14:35:55.731530000Z New Time: 2015-08-27T14:35:46.950417600Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x478 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-08-27T14:35:46.954400700Z New Time: 2015-08-27T14:35:46.949000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12288 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x478 Name: C:\Windows\System32\svchost.exe Previous Time: 2015-08-27T14:35:46.948448200Z New Time: 2015-08-27T14:35:46.944000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Security | Audit Success | 12544 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12544 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12548 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1d00 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1d00 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1d00 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:35:46 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x1d00 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:35:56 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Failure | 12290 | 2015-08-27 17:35:57 | | Microsoft-Windows-Security-Auditing | 5061: Cryptographic operation. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Cryptographic Parameters: Provider Name: Microsoft Software Key Storage Provider Algorithm Name: UNKNOWN Key Name: 51a92691-66f1-280f-d0db-59fad4f73491 Key Type: %%2500 Cryptographic Operation: Operation: %%2480 Return Code: 0x80090016
|
| | Security | Audit Success | 12544 | 2015-08-27 17:45:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 17:45:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 12544 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 5 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x2e0 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Security | Audit Success | 12548 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: SYSTEM Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Security | Audit Success | 13826 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x514 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x514 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x514 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:45:13 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: LAPTOP-5DNN8R19$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x514 Process Name: C:\Windows\System32\VSSVC.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-500 Account Name: Administrator Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-501 Account Name: Guest Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-503 Account Name: DefaultAccount Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13824 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4798: A user's local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 User: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-562 Group Name: Distributed COM Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-573 Group Name: Event Log Readers Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-546 Group Name: Guests Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-568 Group Name: IIS_IUSRS Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-559 Group Name: Performance Log Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-558 Group Name: Performance Monitor Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-580 Group Name: Remote Management Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-581 Group Name: System Managed Accounts Group Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | Security | Audit Success | 13826 | 2015-08-27 17:52:31 | | Microsoft-Windows-Security-Auditing | 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-21-1877548631-935440309-1602752157-1001 Account Name: galff Account Domain: LAPTOP-5DNN8R19 Logon ID: 0x34997 Group: Security ID: S-1-5-32-545 Group Name: Users Group Domain: Builtin Process Information: Process ID: 0x15e8 Process Name: C:\Program Files (x86)\FinalWire\AIDA64 Engineer\aida64.exe
|
| | System | Error | None | 2015-08-20 18:33:07 | galff | DCOM | 10010: The server {9A4948D9-13FC-4FAC-B60A-FBA6EE0FB11C} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 00:25:01 | SYSTEM | Microsoft-Windows-Kernel-Boot | 16: The directory cannot be removed.
|
| | System | Warning | None | 2015-08-21 00:25:10 | | ISH | 1: Incorrect function.
|
| | System | Warning | 212 | 2015-08-21 00:25:10 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&2b15ee36&0&0000.
|
| | System | Warning | 212 | 2015-08-21 00:25:10 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&234d4d4&0&0000.
|
| | System | Warning | 212 | 2015-08-21 00:25:10 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&14ee8579&0&0000.
|
| | System | Warning | 212 | 2015-08-21 00:25:10 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_0002\6&39116f9a&0&0000.
|
| | System | Warning | 212 | 2015-08-21 00:25:10 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_8002\6&797b031&0&0000.
|
| | System | Error | None | 2015-08-21 00:25:18 | | EventLog | 6008: The previous system shutdown at 8:17:39 PM on ?8/?16/?2015 was unexpected.
|
| | System | Error | None | 2015-08-21 00:25:18 | | BugCheck | 1001: The computer has rebooted from a bugcheck. The bugcheck was: 0x0000009f (0x0000000000000003, 0xffffe0019adfec20, 0xffffd0018ee5bad0, 0xffffe0019b526b80). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 082015-11031-01.
|
| | System | Warning | None | 2015-08-21 00:25:19 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Warning | None | 2015-08-21 00:25:20 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on 'time.windows.com,0x9'. NtpClient will try again in 15 minutes and double the reattempt interval thereafter. The error was: No such host is known. (0x80072AF9)
|
| | System | Error | None | 2015-08-21 01:27:01 | | Service Control Manager | 7031: The Sync Host_Session2 service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 10000 milliseconds: Restart the service.
|
| | System | Error | None | 2015-08-21 01:27:01 | | Service Control Manager | 7031: The Contact Data_Session2 service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 10000 milliseconds: Restart the service.
|
| | System | Error | None | 2015-08-21 01:27:01 | | Service Control Manager | 7031: The User Data Storage_Session2 service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 10000 milliseconds: Restart the service.
|
| | System | Error | None | 2015-08-21 01:27:01 | | Service Control Manager | 7031: The User Data Access_Session2 service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 10000 milliseconds: Restart the service.
|
| | System | Error | None | 2015-08-21 01:27:11 | | Service Control Manager | 7032: The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the User Data Storage_Session2 service, but this action failed with the following error: %%1056
|
| | System | Error | None | 2015-08-21 01:27:11 | | Service Control Manager | 7009: A timeout was reached (30000 milliseconds) while waiting for the User Data Storage_Session2 service to connect.
|
| | System | Error | None | 2015-08-21 01:27:11 | | Service Control Manager | 7009: A timeout was reached (30000 milliseconds) while waiting for the Sync Host_Session2 service to connect.
|
| | System | Warning | None | 2015-08-21 01:28:17 | SYSTEM | Microsoft-Windows-WLAN-AutoConfig | 10002: WLAN Extensibility Module has stopped. Module Path: C:\Windows\System32\bcmihvsrv64.dll
|
| | System | Warning | None | 2015-08-21 01:28:40 | | ISH | 1: Incorrect function.
|
| | System | Warning | 212 | 2015-08-21 01:28:46 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&2b15ee36&0&0000.
|
| | System | Warning | 212 | 2015-08-21 01:28:46 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&234d4d4&0&0000.
|
| | System | Warning | 212 | 2015-08-21 01:28:46 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&14ee8579&0&0000.
|
| | System | Warning | 212 | 2015-08-21 01:28:46 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_0002\6&39116f9a&0&0000.
|
| | System | Warning | 212 | 2015-08-21 01:28:46 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_8002\6&797b031&0&0000.
|
| | System | Warning | None | 2015-08-21 01:51:47 | | Display | 4101: Display driver igfxLP stopped responding and has successfully recovered.
|
| | System | Warning | None | 2015-08-21 01:52:21 | | Display | 4101: Display driver igfxLP stopped responding and has successfully recovered.
|
| | System | Warning | None | 2015-08-21 02:12:10 | | Display | 4101: Display driver igfxLP stopped responding and has successfully recovered.
|
| | System | Error | None | 2015-08-21 02:19:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:19:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:19:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:19:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:01 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:08 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:08 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:09 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:09 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:09 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:09 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:10 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:10 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:10 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:10 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:10 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:11 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:11 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:11 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:11 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:12 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:12 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:12 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:12 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:13 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:13 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:13 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:13 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:13 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:14 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:14 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:14 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:14 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:15 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:15 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:15 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:15 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:15 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:16 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:16 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:16 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:16 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:17 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:17 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:17 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:17 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:18 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:18 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:18 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:18 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:37 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:38 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:38 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:38 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:39 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:39 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:39 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:39 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:40 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:40 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:43 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:43 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:43 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:43 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:43 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:44 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:44 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:44 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:44 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:45 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:45 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:45 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:45 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:46 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:46 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:46 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:46 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:47 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:47 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:47 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:47 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:20:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:07 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:07 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:07 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:21:07 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 02:24:11 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 07:25:56 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Warning | None | 2015-08-21 11:57:09 | | Display | 4101: Display driver igfxLP stopped responding and has successfully recovered.
|
| | System | Error | None | 2015-08-21 12:09:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:48 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:49 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:50 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:52 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:53 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:54 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:55 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:56 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:57 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:58 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:09:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:01 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:01 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:01 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:01 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:05 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 12:10:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 16:48:04 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 17:09:57 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 21:52:48 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-21 22:12:28 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:29:40 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2015-08-22 01:44:51 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:44:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:44:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:44:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:44:59 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:00 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:02 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:03 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:04 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:06 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 01:45:08 | galff | DCOM | 10010: The server WindowsDefaultLockScreen did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 13:14:46 | | Service Control Manager | 7023: The Data Sharing Service service terminated with the following error: %%3239247876
|
| | System | Error | None | 2015-08-22 13:19:46 | | Service Control Manager | 7023: The Data Sharing Service service terminated with the following error: %%3239247876
|
| | System | Error | None | 2015-08-22 13:19:46 | | Service Control Manager | 7023: The Data Sharing Service service terminated with the following error: %%3239247876
|
| | System | Error | None | 2015-08-22 13:19:46 | | Service Control Manager | 7023: The Data Sharing Service service terminated with the following error: %%3239247876
|
| | System | Error | None | 2015-08-22 13:46:17 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 13:47:52 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 14:30:43 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 14:32:18 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 15:15:08 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 15:16:43 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-22 15:31:54 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-23 13:21:59 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2015-08-23 18:30:18 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-23 23:36:52 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-24 04:39:42 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Error | None | 2015-08-25 04:30:24 | SYSTEM | DCOM | 10010: The server {7006698D-2974-4091-A424-85DD0B909E23} did not register with DCOM within the required timeout.
|
| | System | Warning | None | 2015-08-26 23:40:43 | | HID_PCI | 4: The system cannot open the file.
|
| | System | Warning | None | 2015-08-26 23:40:43 | | HID_PCI | 4: The system cannot open the file.
|
| | System | Warning | None | 2015-08-26 23:40:43 | | HID_PCI | 4: The system cannot open the file.
|
| | System | Warning | None | 2015-08-26 23:40:43 | | HID_PCI | 4: The system cannot open the file.
|
| | System | Warning | None | 2015-08-26 23:40:43 | | HID_PCI | 4: The system cannot open the file.
|
| | System | Error | None | 2015-08-27 16:42:07 | SYSTEM | Microsoft-Windows-Kernel-Boot | 16: The directory cannot be removed.
|
| | System | Warning | None | 2015-08-27 16:42:26 | | ISH | 1: Incorrect function.
|
| | System | Warning | 212 | 2015-08-27 16:42:27 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&2b15ee36&0&0000.
|
| | System | Warning | 212 | 2015-08-27 16:42:27 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&234d4d4&0&0000.
|
| | System | Warning | 212 | 2015-08-27 16:42:27 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WudfRd failed to load for the device HID\Vid_8086&Pid_0001\6&14ee8579&0&0000.
|
| | System | Warning | 212 | 2015-08-27 16:42:27 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_0002\6&39116f9a&0&0000.
|
| | System | Warning | 212 | 2015-08-27 16:42:27 | SYSTEM | Microsoft-Windows-Kernel-PnP | 219: The driver \Driver\WUDFRd failed to load for the device HID\Vid_8086&Pid_8002\6&797b031&0&0000.
|
| | System | Error | None | 2015-08-27 16:42:34 | | EventLog | 6008: The previous system shutdown at 22:04:39 on ?26/?08/?2015 was unexpected.
|
| | System | Error | None | 2015-08-27 16:42:39 | | BugCheck | 1001: The computer has rebooted from a bugcheck. The bugcheck was: 0x0000009f (0x0000000000000003, 0xffffe000d28e6a00, 0xfffff802308e3ad0, 0xffffe000d2f2a010). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 082715-28140-01.
|
| | System | Error | None | 2015-08-27 16:44:04 | NETWORK SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\NETWORK SERVICE SID (S-1-5-20) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|
| | System | Error | None | 2015-08-27 16:44:32 | LOCAL SERVICE | DCOM | 10016: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\LOCAL SERVICE SID (S-1-5-19) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.
|