| | | | |
|
| | Файл DLL | Версия | Описание
|
| | accessibilitycpl.dll | 6.1.7601.17514 | Ease of access control panel
|
| | acctres.dll | 6.1.7600.16385 | Microsoft Internet Account Manager Resources
|
| | acledit.dll | 6.1.7600.16385 | Access Control List Editor
|
| | aclui.dll | 6.1.7601.23403 | Security Descriptor Editor
|
| | acppage.dll | 6.1.7601.17514 | Compatibility Tab Shell Extension Library
|
| | acsignext.dll | 17.1.51.0 | AutoCAD component
|
| | acsignextres.dll | 17.1.51.0 | AutoCAD component
|
| | acsignicon.dll | 17.1.51.0 | AutoCAD component
|
| | actioncenter.dll | 6.1.7601.17514 | Action Center
|
| | actioncentercpl.dll | 6.1.7601.17514 | Action Center Control Panel
|
| | activeds.dll | 6.1.7601.23403 | ADs Router Layer DLL
|
| | actxprxy.dll | 6.1.7601.23403 | ActiveX Interface Marshaling Library
|
| | admtmpl.dll | 6.1.7601.23403 | Administrative Templates Extension
|
| | admwprox.dll | 7.5.7601.23403 | IIS Admin Com API Proxy dll
|
| | adprovider.dll | 6.1.7601.23403 | adprovider DLL
|
| | adsldp.dll | 6.1.7601.17514 | ADs LDAP Provider DLL
|
| | adsldpc.dll | 6.1.7601.23403 | ADs LDAP Provider C DLL
|
| | adsmsext.dll | 6.1.7601.23545 | ADs LDAP Provider DLL
|
| | adsnt.dll | 6.1.7600.16385 | ADs Windows NT Provider DLL
|
| | adtschema.dll | 6.1.7601.23915 | Security Audit Schema DLL
|
| | advapi32.dll | 6.1.7601.23915 | Advanced Windows 32 Base API
|
| | advpack.dll | 8.0.7601.23403 | ADVPACK
|
| | aecache.dll | 6.1.7600.16385 | AECache Sysprep Plugin
|
| | aeevts.dll | 6.1.7600.16385 | Application Experience Event Resources
|
| | ahadmin.dll | 7.5.7601.23403 | Application Host Admin Proxy
|
| | alttab.dll | 6.1.7600.16385 | Windows Shell Alt Tab
|
| | amstream.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | amxread.dll | 6.1.7600.16385 | API Tracing Manifest Read Library
|
| | apds.dll | 6.1.7600.16385 | Microsoft® Help Data Services Module
|
| | apilogen.dll | 6.1.7600.16385 | API Tracing Log Engine
|
| | api-ms-win-core-console-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-datetime-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-debug-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-delayload-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-errorhandling-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-fibers-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l1-2-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-file-l2-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-handle-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-heap-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-interlocked-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-io-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-libraryloader-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-localization-l1-2-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-localregistry-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-memory-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-misc-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-namedpipe-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-processenvironment-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-processthreads-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-processthreads-l1-1-1.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-profile-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-rtlsupport-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-string-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-synch-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-synch-l1-2-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-sysinfo-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-threadpool-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-timezone-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-core-util-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-xstate-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-core-xstate-l2-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-conio-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-convert-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-environment-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-filesystem-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-heap-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-locale-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-math-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-multibyte-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-private-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-process-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-runtime-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-stdio-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-string-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-time-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-crt-utility-l1-1-0.dll | 10.0.10586.1171 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-advapi32-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-advapi32-l2-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-normaliz-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-ole32-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shell32-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shlwapi-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-shlwapi-l2-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-user32-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-downlevel-version-l1-1-0.dll | 6.2.9200.16492 | ApiSet Stub DLL
|
| | api-ms-win-security-base-l1-1-0.dll | 6.1.7601.23915 | ApiSet Stub DLL
|
| | api-ms-win-security-lsalookup-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-security-sddl-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-core-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-management-l2-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | api-ms-win-service-winsvc-l1-1-0.dll | 6.1.7600.16385 | ApiSet Stub DLL
|
| | apircl.dll | 6.1.7600.16385 | Microsoft® InfoTech IR Local DLL
|
| | apisetschema.dll | 6.1.7601.23915 | ApiSet Schema DLL
|
| | apphelp.dll | 6.1.7601.23403 | Application Compatibility Client Library
|
| | apphlpdm.dll | 6.1.7600.16385 | Application Compatibility Help Module
|
| | appidapi.dll | 6.1.7601.23915 | Application Identity APIs Dll
|
| | appidpolicyengineapi.dll | 6.1.7600.16385 | AppId Policy Engine API Module
|
| | appmgmts.dll | 6.1.7601.23403 | Software installation Service
|
| | appmgr.dll | 6.1.7601.17514 | Software Installation Snapin Extenstion
|
| | apss.dll | 6.1.7600.16385 | Microsoft® InfoTech Storage System Library
|
| | asferror.dll | 12.0.7600.16385 | ASF Error Definitions
|
| | aspnet_counters.dll | 4.6.81.0 | Microsoft ASP.NET Performance Counter Shim DLL
|
| | asycfilt.dll | 6.1.7601.23713 |
|
| | atl.dll | 3.5.2284.0 | ATL Module for Windows XP (Unicode)
|
| | atl100.dll | 10.0.40219.473 | ATL Module for Windows
|
| | atl110.dll | 11.0.60610.1 | ATL Module for Windows
|
| | atmfd.dll | 5.1.2.252 | Windows NT OpenType/Type 1 Font Driver
|
| | atmlib.dll | 5.1.2.252 | Windows NT OpenType/Type 1 API Library.
|
| | audiodev.dll | 6.1.7601.17514 | Portable Media Devices Shell Extension
|
| | audioeng.dll | 6.1.7601.23471 | Audio Engine
|
| | audiokse.dll | 6.1.7601.23471 | Audio Ks Endpoint
|
| | audioses.dll | 6.1.7601.23471 | Audio Session
|
| | auditnativesnapin.dll | 6.1.7600.16385 | Audit Policy Group Policy Editor Extension
|
| | auditpolicygpinterop.dll | 6.1.7600.16385 | Audit Policy GP Module
|
| | auditpolmsg.dll | 6.1.7600.16385 | Audit Policy MMC SnapIn Messages
|
| | authfwcfg.dll | 6.1.7600.16385 | Windows Firewall with Advanced Security Configuration Helper
|
| | authfwgp.dll | 6.1.7600.16385 | Windows Firewall with Advanced Security Group Policy Editor Extension
|
| | authfwsnapin.dll | 6.1.7601.17514 | Microsoft.WindowsFirewall.SnapIn
|
| | authfwwizfwk.dll | 6.1.7600.16385 | Wizard Framework
|
| | authui.dll | 6.1.7601.23593 | Windows Authentication UI
|
| | authz.dll | 6.1.7600.16385 | Authorization Framework
|
| | autoplay.dll | 6.1.7601.17514 | AutoPlay Control Panel
|
| | auxiliarydisplayapi.dll | 6.1.7600.16385 | Microsoft Windows SideShow API
|
| | auxiliarydisplaycpl.dll | 6.1.7601.17514 | Microsoft Windows SideShow Control Panel
|
| | avicap32.dll | 6.1.7600.16385 | AVI Capture window class
|
| | avifil32.dll | 6.1.7601.17514 | Microsoft AVI File support library
|
| | avrt.dll | 6.1.7600.16385 | Multimedia Realtime Runtime
|
| | azroles.dll | 6.1.7601.23403 | azroles Module
|
| | azroleui.dll | 6.1.7601.17514 | Authorization Manager
|
| | azsqlext.dll | 6.1.7601.23403 | AzMan Sql Audit Extended Stored Procedures Dll
|
| | basecsp.dll | 6.1.7601.23403 | Microsoft Base Smart Card Crypto Provider
|
| | batmeter.dll | 6.1.7601.17514 | Battery Meter Helper DLL
|
| | bcrypt.dll | 6.1.7601.23915 | Windows Cryptographic Primitives Library (Wow64)
|
| | bcryptprimitives.dll | 6.1.7601.23451 | Windows Cryptographic Primitives Library
|
| | bidispl.dll | 6.1.7600.16385 | Bidispl DLL
|
| | biocredprov.dll | 6.1.7600.16385 | WinBio Credential Provider
|
| | bitsperf.dll | 7.5.7601.17514 | Perfmon Counter Access
|
| | bitsprx2.dll | 7.5.7600.16385 | Background Intelligent Transfer Service Proxy
|
| | bitsprx3.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 2.0 Proxy
|
| | bitsprx4.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 2.5 Proxy
|
| | bitsprx5.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 3.0 Proxy
|
| | bitsprx6.dll | 7.5.7600.16385 | Background Intelligent Transfer Service 4.0 Proxy
|
| | blackbox.dll | 11.0.7601.23471 | BlackBox DLL
|
| | bootvid.dll | 6.1.7600.16385 | VGA Boot Driver
|
| | browcli.dll | 6.1.7601.23403 | Browser Service Client DLL
|
| | browseui.dll | 6.1.7601.17514 | Shell Browser UI Library
|
| | btpanui.dll | 6.1.7600.16385 | Bluetooth PAN User Interface
|
| | bwcontexthandler.dll | 1.0.0.1 | ContextH Application
|
| | bwunpairelevated.dll | 6.1.7600.16385 | BWUnpairElevated Proxy Dll
|
| | c_g18030.dll | 6.1.7600.16385 | GB18030 DBCS-Unicode Conversion DLL
|
| | c_is2022.dll | 6.1.7600.16385 | ISO-2022 Code Page Translation DLL
|
| | c_iscii.dll | 6.1.7601.17514 | ISCII Code Page Translation DLL
|
| | cabinet.dll | 6.1.7601.17514 | Microsoft® Cabinet File API
|
| | cabview.dll | 6.1.7601.17514 | Cabinet File Viewer Shell Extension
|
| | capiprovider.dll | 6.1.7601.23403 | capiprovider DLL
|
| | capisp.dll | 6.1.7600.16385 | Sysprep cleanup dll for CAPI
|
| | catsrv.dll | 2001.12.8531.23403 | COM+ Configuration Catalog Server
|
| | catsrvps.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Server Proxy/Stub
|
| | catsrvut.dll | 2001.12.8531.23403 | COM+ Configuration Catalog Server Utilities
|
| | cca.dll | 6.6.7601.23403 | CCA DirectShow Filter.
|
| | cdosys.dll | 6.6.7601.23789 | Microsoft CDO for Windows Library
|
| | certcli.dll | 6.1.7601.23915 | Microsoft® Active Directory Certificate Services Client
|
| | certcredprovider.dll | 6.1.7600.16385 | Cert Credential Provider
|
| | certenc.dll | 6.1.7601.23403 | Active Directory Certificate Services Encoding
|
| | certenroll.dll | 6.1.7601.23403 | Microsoft® Active Directory Certificate Services Enrollment Client
|
| | certenrollui.dll | 6.1.7600.16385 | X509 Certificate Enrollment UI
|
| | certmgr.dll | 6.1.7601.17514 | Certificates snap-in
|
| | certpoleng.dll | 6.1.7601.17514 | Certificate Policy Engine
|
| | cewmdm.dll | 12.0.7601.23403 | Windows CE WMDM Service Provider
|
| | cfgbkend.dll | 6.1.7600.16385 | Configuration Backend Interface
|
| | cfgmgr32.dll | 6.1.7601.23403 | Configuration Manager DLL
|
| | chsbrkr.dll | 6.1.7600.16385 | Simplified Chinese Word Breaker
|
| | chtbrkr.dll | 6.1.7600.16385 | Chinese Traditional Word Breaker
|
| | chxreadingstringime.dll | 6.1.7600.16385 | CHxReadingStringIME
|
| | cic.dll | 6.1.7601.23892 | CIC - MMC controls for Taskpad
|
| | clb.dll | 6.1.7600.16385 | Column List Box
|
| | clbcatq.dll | 2001.12.8531.23403 | COM+ Configuration Catalog
|
| | clevomof.dll | 5.1.2600.0 | Resource only DLL containing MOF for ASL code
|
| | clfsw32.dll | 6.1.7601.23403 | Common Log Marshalling Win32 DLL
|
| | cliconfg.dll | 6.1.7600.16385 | SQL Client Configuration Utility DLL
|
| | clusapi.dll | 6.1.7601.23403 | Cluster API Library
|
| | cmcfg32.dll | 7.2.7601.23403 | Microsoft Connection Manager Configuration Dll
|
| | cmdial32.dll | 7.2.7600.16385 | Microsoft Connection Manager
|
| | cmicryptinstall.dll | 6.1.7600.16385 | Installers for cryptographic elements of CMI objects
|
| | cmifw.dll | 6.1.7600.16385 | Windows Firewall rule configuration plug-in
|
| | cmipnpinstall.dll | 6.1.7600.16385 | PNP plugin installer for CMI
|
| | cmlua.dll | 7.2.7601.23403 | Connection Manager Admin API Helper
|
| | cmpbk32.dll | 7.2.7601.23403 | Microsoft Connection Manager Phonebook
|
| | cmstplua.dll | 7.2.7601.23403 | Connection Manager Admin API Helper for Setup
|
| | cmutil.dll | 7.2.7601.23403 | Microsoft Connection Manager Utility Lib
|
| | cngaudit.dll | 6.1.7600.16385 | Windows Cryptographic Next Generation audit library
|
| | cngprovider.dll | 6.1.7601.23403 | cngprovider DLL
|
| | cnvfat.dll | 6.1.7600.16385 | FAT File System Conversion Utility DLL
|
| | colbact.dll | 2001.12.8531.23403 | COM+
|
| | colorcnv.dll | 6.1.7601.23403 | Windows Media Color Conversion
|
| | colorui.dll | 6.1.7601.23403 | Microsoft Color Control Panel
|
| | comcat.dll | 6.1.7601.23889 | Microsoft Component Category Manager Library
|
| | comctl32.dll | 5.82.7601.18837 | User Experience Controls Library
|
| | comdlg32.dll | 6.1.7601.23403 | Common Dialogs DLL
|
| | compobj.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | compstui.dll | 6.1.7600.16385 | Common Property Sheet User Interface DLL
|
| | comrepl.dll | 2001.12.8530.16385 | COM+
|
| | comres.dll | 2001.12.8530.16385 | COM+ Resources
|
| | comsnap.dll | 2001.12.8530.16385 | COM+ Explorer MMC Snapin
|
| | comsvcs.dll | 2001.12.8531.23403 | COM+ Services
|
| | comuid.dll | 2001.12.8530.16385 | COM+ Explorer UI
|
| | concrt140.dll | 14.13.26020.0 | Microsoft® Concurrency Runtime Library
|
| | connect.dll | 6.1.7600.16385 | Get Connected Wizards
|
| | console.dll | 6.1.7600.16385 | Control Panel Console Applet
|
| | cpfilters.dll | 6.6.7601.23403 | PTFilter & Encypter/Decrypter Tagger Filters.
|
| | cpuinf32.dll | |
|
| | credssp.dll | 6.1.7601.23915 | Credential Delegation Security Package
|
| | credui.dll | 6.1.7601.23403 | Credential Manager User Interface
|
| | crtdll.dll | 4.0.1183.1 | Microsoft C Runtime Library
|
| | crypt32.dll | 6.1.7601.23769 | Crypto API32
|
| | cryptbase.dll | 6.1.7601.23915 | Base cryptographic API DLL
|
| | cryptdlg.dll | 6.1.7601.23403 | Microsoft Common Certificate Dialogs
|
| | cryptdll.dll | 6.1.7601.23403 | Cryptography Manager
|
| | cryptext.dll | 6.1.7600.16385 | Crypto Shell Extensions
|
| | cryptnet.dll | 6.1.7601.23769 | Crypto Network Related API
|
| | cryptsp.dll | 6.1.7601.23471 | Cryptographic Service Provider API
|
| | cryptsvc.dll | 6.1.7601.23769 | Cryptographic Services
|
| | cryptui.dll | 6.1.7601.23471 | Microsoft Trust UI Provider
|
| | cryptxml.dll | 6.1.7600.16385 | XML DigSig API
|
| | cscapi.dll | 6.1.7601.23403 | Offline Files Win32 API
|
| | cscdll.dll | 6.1.7601.23403 | Offline Files Temporary Shim
|
| | cscobj.dll | 6.1.7601.23403 | In-proc COM object used by clients of CSC API
|
| | csver.dll | 9.4.0.1027 | CSVer
|
| | ctl3d32.dll | 2.31.0.0 | Ctl3D 3D Windows Controls
|
| | d2d1.dll | 6.2.9200.20883 | Microsoft D2D Library
|
| | d3d10.dll | 6.2.9200.16492 | Direct3D 10 Runtime
|
| | d3d10_1.dll | 6.2.9200.16492 | Direct3D 10.1 Runtime
|
| | d3d10_1core.dll | 6.2.9200.16492 | Direct3D 10.1 Runtime
|
| | d3d10core.dll | 6.2.9200.16492 | Direct3D 10 Runtime
|
| | d3d10level9.dll | 6.2.9200.21830 | Direct3D 10 to Direct3D9 Translation Runtime
|
| | d3d10warp.dll | 6.2.9200.21152 | Direct3D 10 Rasterizer
|
| | d3d11.dll | 6.2.9200.20807 | Direct3D 11 Runtime
|
| | d3d8.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3d8thk.dll | 6.1.7600.16385 | Microsoft Direct3D OS Thunk Layer
|
| | d3d9.dll | 6.1.7601.17514 | Direct3D 9 Runtime
|
| | d3dcompiler_33.dll | 9.18.904.15 | Microsoft Direct3D
|
| | d3dcompiler_34.dll | 9.19.949.46 | Microsoft Direct3D
|
| | d3dcompiler_35.dll | 9.19.949.1104 | Microsoft Direct3D
|
| | d3dcompiler_36.dll | 9.19.949.2111 | Microsoft Direct3D
|
| | d3dcompiler_37.dll | 9.22.949.2248 | Microsoft Direct3D
|
| | d3dcompiler_38.dll | 9.23.949.2378 | Microsoft Direct3D
|
| | d3dcompiler_39.dll | 9.24.949.2307 | Microsoft Direct3D
|
| | d3dcompiler_40.dll | 9.24.950.2656 | Direct3D HLSL Compiler
|
| | d3dcompiler_41.dll | 9.26.952.2844 | Direct3D HLSL Compiler
|
| | d3dcompiler_42.dll | 9.27.952.3022 | Direct3D HLSL Compiler
|
| | d3dcompiler_43.dll | 9.29.952.3111 | Direct3D HLSL Compiler
|
| | d3dcompiler_47.dll | 6.3.9600.18611 | Direct3D HLSL Compiler for Redistribution
|
| | d3dcsx_42.dll | 9.27.952.3022 | Direct3D 10.1 Extensions
|
| | d3dcsx_43.dll | 9.29.952.3111 | Direct3D 10.1 Extensions
|
| | d3dim.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dim700.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dramp.dll | 6.1.7600.16385 | Microsoft Direct3D
|
| | d3dx10.dll | 9.16.843.0 | Microsoft Direct3D
|
| | d3dx10_33.dll | 9.18.904.21 | Microsoft Direct3D
|
| | d3dx10_34.dll | 9.19.949.46 | Microsoft Direct3D
|
| | d3dx10_35.dll | 9.19.949.1104 | Microsoft Direct3D
|
| | d3dx10_36.dll | 9.19.949.2009 | Microsoft Direct3D
|
| | d3dx10_37.dll | 9.19.949.2187 | Microsoft Direct3D
|
| | d3dx10_38.dll | 9.23.949.2378 | Microsoft Direct3D
|
| | d3dx10_39.dll | 9.24.949.2307 | Microsoft Direct3D
|
| | d3dx10_40.dll | 9.24.950.2656 | Direct3D 10.1 Extensions
|
| | d3dx10_41.dll | 9.26.952.2844 | Direct3D 10.1 Extensions
|
| | d3dx10_42.dll | 9.27.952.3001 | Direct3D 10.1 Extensions
|
| | d3dx10_43.dll | 9.29.952.3111 | Direct3D 10.1 Extensions
|
| | d3dx11_42.dll | 9.27.952.3022 | Direct3D 10.1 Extensions
|
| | d3dx11_43.dll | 9.29.952.3111 | Direct3D 10.1 Extensions
|
| | d3dx9_24.dll | 9.5.132.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_25.dll | 9.6.168.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_26.dll | 9.7.239.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_27.dll | 9.8.299.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_28.dll | 9.10.455.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_29.dll | 9.11.519.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_30.dll | 9.12.589.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_31.dll | 9.15.779.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_32.dll | 9.16.843.0 | Microsoft® DirectX for Windows®
|
| | d3dx9_33.dll | 9.18.904.15 | Microsoft® DirectX for Windows®
|
| | d3dx9_34.dll | 9.19.949.46 | Microsoft® DirectX for Windows®
|
| | d3dx9_35.dll | 9.19.949.1104 | Microsoft® DirectX for Windows®
|
| | d3dx9_36.dll | 9.19.949.2111 | Microsoft® DirectX for Windows®
|
| | d3dx9_37.dll | 9.22.949.2248 | Microsoft® DirectX for Windows®
|
| | d3dx9_38.dll | 9.23.949.2378 | Microsoft® DirectX for Windows®
|
| | d3dx9_39.dll | 9.24.949.2307 | Microsoft® DirectX for Windows®
|
| | d3dx9_40.dll | 9.24.950.2656 | Direct3D 9 Extensions
|
| | d3dx9_41.dll | 9.26.952.2844 | Direct3D 9 Extensions
|
| | d3dx9_42.dll | 9.27.952.3001 | Direct3D 9 Extensions
|
| | d3dx9_43.dll | 9.29.952.3111 | Direct3D 9 Extensions
|
| | d3dxof.dll | 6.1.7600.16385 | DirectX Files DLL
|
| | dataclen.dll | 6.1.7600.16385 | Disk Space Cleaner for Windows
|
| | davclnt.dll | 6.1.7601.23542 | Web DAV Client DLL
|
| | davhlpr.dll | 6.1.7600.16385 | DAV Helper DLL
|
| | dbgeng.dll | 6.1.7601.17514 | Windows Symbolic Debugger Engine
|
| | dbghelp.dll | 6.1.7601.17514 | Windows Image Helper
|
| | dbnetlib.dll | 6.1.7600.16385 | Winsock Oriented Net DLL for SQL Clients
|
| | dbnmpntw.dll | 6.1.7600.16385 | Named Pipes Net DLL for SQL Clients
|
| | dciman32.dll | 6.1.7601.23930 | DCI Manager
|
| | ddaclsys.dll | 6.1.7600.16385 | SysPrep module for Reseting Data Drive ACL
|
| | ddoiproxy.dll | 6.1.7600.16385 | DDOI Interface Proxy
|
| | ddores.dll | 6.1.7600.16385 | Device Category information and resources
|
| | ddraw.dll | 6.1.7600.16385 | Microsoft DirectDraw
|
| | ddrawex.dll | 6.1.7600.16385 | Direct Draw Ex
|
| | defaultlocationcpl.dll | 6.1.7601.17514 | Default Location Control Panel
|
| | deskadp.dll | 6.1.7600.16385 | Advanced display adapter properties
|
| | deskmon.dll | 6.1.7600.16385 | Advanced display monitor properties
|
| | deskperf.dll | 6.1.7600.16385 | Advanced display performance properties
|
| | devenum.dll | 6.6.7601.23403 | Device enumeration.
|
| | devicecenter.dll | 6.1.7601.17514 | Device Center
|
| | devicedisplaystatusmanager.dll | 6.1.7600.16385 | Device Display Status Manager
|
| | devicemetadataparsers.dll | 6.1.7600.16385 | Common Device Metadata parsers
|
| | devicepairing.dll | 6.1.7600.16385 | Shell extensions for Device Pairing
|
| | devicepairingfolder.dll | 6.1.7601.17514 | Device Pairing Folder
|
| | devicepairinghandler.dll | 6.1.7600.16385 | Device Pairing Handler Dll
|
| | devicepairingproxy.dll | 6.1.7600.16385 | Device Pairing Proxy Dll
|
| | deviceuxres.dll | 6.1.7600.16385 | Windows Device User Experience Resource File
|
| | devmgr.dll | 6.1.7600.16385 | Device Manager MMC Snapin
|
| | devobj.dll | 6.1.7601.23403 | Device Information Set DLL
|
| | devrtl.dll | 6.1.7601.23403 | Device Management Run Time Library
|
| | dfscli.dll | 6.1.7600.16385 | Windows NT Distributed File System Client DLL
|
| | dfshim.dll | 4.0.41210.0 | ClickOnce Application Deployment Support Library
|
| | dfsshlex.dll | 6.1.7600.16385 | Distributed File System shell extension
|
| | dhcpcmonitor.dll | 6.1.7601.23403 | DHCP Client Monitor Dll
|
| | dhcpcore.dll | 6.1.7601.23403 | DHCP Client Service
|
| | dhcpcore6.dll | 6.1.7601.23403 | DHCPv6 Client
|
| | dhcpcsvc.dll | 6.1.7601.23403 | DHCP Client Service
|
| | dhcpcsvc6.dll | 6.1.7601.23403 | DHCPv6 Client
|
| | dhcpqec.dll | 6.1.7600.16385 | Microsoft DHCP NAP Enforcement Client
|
| | dhcpsapi.dll | 6.1.7600.16385 | DHCP Server API Stub DLL
|
| | difxapi.dll | 2.1.0.0 | Driver Install Frameworks for API library module
|
| | dimsjob.dll | 6.1.7601.23403 | DIMS Job DLL
|
| | dimsroam.dll | 6.1.7601.23403 | Key Roaming DIMS Provider DLL
|
| | dinput.dll | 6.1.7600.16385 | Microsoft DirectInput
|
| | dinput8.dll | 6.1.7600.16385 | Microsoft DirectInput
|
| | directdb.dll | 6.1.7600.16385 | Microsoft Direct Database API
|
| | diskcopy.dll | 6.1.7600.16385 | Windows DiskCopy
|
| | dispex.dll | 5.8.7601.23403 | Microsoft ® DispEx
|
| | display.dll | 6.1.7601.23403 | Display Control Panel
|
| | dmband.dll | 6.1.7600.16385 | Microsoft DirectMusic Band
|
| | dmcompos.dll | 6.1.7600.16385 | Microsoft DirectMusic Composer
|
| | dmdlgs.dll | 6.1.7600.16385 | Disk Management Snap-in Dialogs
|
| | dmdskmgr.dll | 6.1.7600.16385 | Disk Management Snap-in Support Library
|
| | dmdskres.dll | 6.1.7600.16385 | Disk Management Snap-in Resources
|
| | dmdskres2.dll | 6.1.7600.16385 | Disk Management Snap-in Resources
|
| | dmime.dll | 6.1.7600.16385 | Microsoft DirectMusic Interactive Engine
|
| | dmintf.dll | 6.1.7600.16385 | Disk Management DCOM Interface Stub
|
| | dmloader.dll | 6.1.7600.16385 | Microsoft DirectMusic Loader
|
| | dmocx.dll | 6.1.7600.16385 | TreeView OCX
|
| | dmrc.dll | 6.1.7600.16385 | Windows MRC
|
| | dmscript.dll | 6.1.7600.16385 | Microsoft DirectMusic Scripting
|
| | dmstyle.dll | 6.1.7600.16385 | Microsoft DirectMusic Style Engline
|
| | dmsynth.dll | 6.1.7600.16385 | Microsoft DirectMusic Software Synthesizer
|
| | dmusic.dll | 6.1.7600.16385 | Microsoft DirectMusic Core Services
|
| | dmutil.dll | 6.1.7600.16385 | Logical Disk Manager Utility Library
|
| | dmvdsitf.dll | 6.1.7600.16385 | Disk Management Snap-in Support Library
|
| | dnsapi.dll | 6.1.7601.23403 | DNS Client API DLL
|
| | dnscmmc.dll | 6.1.7601.23403 | DNS Client MMC Snap-in DLL
|
| | docprop.dll | 6.1.7601.23403 | OLE DocFile Property Page
|
| | dot3api.dll | 6.1.7601.23403 | 802.3 Autoconfiguration API
|
| | dot3cfg.dll | 6.1.7601.17514 | 802.3 Netsh Helper
|
| | dot3dlg.dll | 6.1.7601.23403 | 802.3 UI Helper
|
| | dot3gpclnt.dll | 6.1.7601.23403 | 802.3 Group Policy Client
|
| | dot3gpui.dll | 6.1.7600.16385 | 802.3 Network Policy Management Snap-in
|
| | dot3hc.dll | 6.1.7600.16385 | Dot3 Helper Class
|
| | dot3msm.dll | 6.1.7601.23403 | 802.3 Media Specific Module
|
| | dot3ui.dll | 6.1.7601.17514 | 802.3 Advanced UI
|
| | dpapiprovider.dll | 6.1.7601.23403 | dpapiprovider DLL
|
| | dplayx.dll | 6.1.7600.16385 | Microsoft DirectPlay
|
| | dpmodemx.dll | 6.1.7600.16385 | Modem and Serial Connection For DirectPlay
|
| | dpnaddr.dll | 6.1.7601.23403 | Microsoft DirectPlay8 Address
|
| | dpnathlp.dll | 6.1.7601.23403 | Microsoft DirectPlay NAT Helper UPnP
|
| | dpnet.dll | 6.1.7601.23403 | Microsoft DirectPlay
|
| | dpnhpast.dll | 6.1.7601.23403 | Microsoft DirectPlay NAT Helper PAST
|
| | dpnhupnp.dll | 6.1.7601.23403 | Microsoft DirectPlay NAT Helper UPNP
|
| | dpnlobby.dll | 6.1.7601.23403 | Microsoft DirectPlay8 Lobby
|
| | dpwsockx.dll | 6.1.7600.16385 | Internet TCP/IP and IPX Connection For DirectPlay
|
| | dpx.dll | 6.1.7601.17514 | Microsoft(R) Delta Package Expander
|
| | drmmgrtn.dll | 11.0.7601.23471 | DRM Migration DLL
|
| | drmv2clt.dll | 11.0.7601.23471 | DRMv2 Client DLL
|
| | drprov.dll | 6.1.7600.16385 | Microsoft Remote Desktop Session Host Server Network Provider
|
| | drt.dll | 6.1.7600.16385 | Distributed Routing Table
|
| | drtprov.dll | 6.1.7600.16385 | Distributed Routing Table Providers
|
| | drttransport.dll | 6.1.7600.16385 | Distributed Routing Table Transport Provider
|
| | drvstore.dll | 6.1.7601.23403 | Driver Store API
|
| | ds32gt.dll | 6.1.7600.16385 | ODBC Driver Setup Generic Thunk
|
| | dsauth.dll | 6.1.7601.17514 | DS Authorization for Services
|
| | dsdmo.dll | 6.1.7600.16385 | DirectSound Effects
|
| | dshowrdpfilter.dll | 1.0.0.0 | RDP Renderer Filter (redirector)
|
| | dskquota.dll | 6.1.7600.16385 | Windows Shell Disk Quota Support DLL
|
| | dskquoui.dll | 6.1.7601.17514 | Windows Shell Disk Quota UI DLL
|
| | dsound.dll | 6.1.7600.16385 | DirectSound
|
| | dsprop.dll | 6.1.7600.16385 | Windows Active Directory Property Pages
|
| | dsquery.dll | 6.1.7600.16385 | Directory Service Find
|
| | dsrole.dll | 6.1.7600.16385 | DS Role Client DLL
|
| | dssec.dll | 6.1.7600.16385 | Directory Service Security UI
|
| | dssenh.dll | 6.1.7600.16385 | Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
|
| | dsuiext.dll | 6.1.7601.17514 | Directory Service Common UI
|
| | dswave.dll | 6.1.7600.16385 | Microsoft DirectMusic Wave
|
| | dtsh.dll | 6.1.7601.23403 | Detection and Sharing Status API
|
| | dui70.dll | 6.1.7601.23403 | Windows DirectUI Engine
|
| | duser.dll | 6.1.7600.16385 | Windows DirectUser Engine
|
| | dwmapi.dll | 6.1.7601.23403 | Microsoft Desktop Window Manager API
|
| | dwmcore.dll | 6.1.7601.23403 | Microsoft DWM Core Library
|
| | dwrite.dll | 6.2.9200.22164 | Microsoft DirectX Typography Services
|
| | dxdiagn.dll | 6.1.7601.17514 | Microsoft DirectX Diagnostic Tool
|
| | dxgi.dll | 6.2.9200.16492 | DirectX Graphics Infrastructure
|
| | dxmasf.dll | 12.0.7601.23930 | Microsoft Windows Media Component Removal File.
|
| | dxptaskringtone.dll | 6.1.7601.23864 | Microsoft Ringtone Editor
|
| | dxptasksync.dll | 6.1.7601.17514 | Microsoft Windows DXP Sync.
|
| | dxtmsft.dll | 11.0.9600.18860 | DirectX Media -- Image DirectX Transforms
|
| | dxtrans.dll | 11.0.9600.18860 | DirectX Media -- DirectX Transform Core
|
| | dxva2.dll | 6.1.7600.16385 | DirectX Video Acceleration 2.0 DLL
|
| | eapp3hst.dll | 6.1.7601.23403 | Microsoft ThirdPartyEapDispatcher
|
| | eappcfg.dll | 6.1.7601.23403 | Eap Peer Config
|
| | eappgnui.dll | 6.1.7601.23403 | EAP Generic UI
|
| | eapphost.dll | 6.1.7601.23403 | Microsoft EAPHost Peer service
|
| | eappprxy.dll | 6.1.7601.23403 | Microsoft EAPHost Peer Client DLL
|
| | eapqec.dll | 6.1.7600.16385 | Microsoft EAP NAP Enforcement Client
|
| | efsadu.dll | 6.1.7600.16385 | File Encryption Utility
|
| | efscore.dll | 6.1.7601.23403 | EFS Core Library
|
| | efsutil.dll | 6.1.7600.16385 | EFS Utility Library
|
| | ehstorapi.dll | 6.1.7601.17514 | Windows Enhanced Storage API
|
| | ehstorpwdmgr.dll | 6.1.7600.16385 | Windows Enhanced Storage Password Manager
|
| | ehstorshell.dll | 6.1.7600.16385 | Windows Enhanced Storage Shell Extension DLL
|
| | els.dll | 6.1.7601.23403 | Event Viewer Snapin
|
| | elscore.dll | 6.1.7600.16385 | Els Core Platform DLL
|
| | elshyph.dll | 6.3.9600.16428 | ELS Hyphenation Service
|
| | elslad.dll | 6.1.7600.16385 | ELS Language Detection
|
| | elstrans.dll | 6.1.7601.17514 | ELS Transliteration Service
|
| | encapi.dll | 6.1.7600.16385 | Encoder API
|
| | encdec.dll | 6.6.7601.23403 | XDSCodec & Encypter/Decrypter Tagger Filters.
|
| | eqossnap.dll | 6.1.7600.16385 | EQoS Snapin extension
|
| | es.dll | 2001.12.8530.16385 | COM+
|
| | esent.dll | 6.1.7601.23403 | Extensible Storage Engine for Microsoft(R) Windows(R)
|
| | esentprf.dll | 6.1.7600.16385 | Extensible Storage Engine Performance Monitoring Library for Microsoft(R) Windows(R)
|
| | eventcls.dll | 6.1.7601.23403 | Microsoft® Volume Shadow Copy Service event class
|
| | evr.dll | 6.1.7601.23471 | Enhanced Video Renderer DLL
|
| | explorerframe.dll | 6.1.7601.23893 | ExplorerFrame
|
| | expsrv.dll | 6.0.72.9589 | Visual Basic for Applications Runtime - Expression Service
|
| | f3ahvoas.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for Fujitsu FMV oyayubi-shift keyboard
|
| | faultrep.dll | 6.1.7601.17514 | Windows User Mode Crash Reporting DLL
|
| | fdbth.dll | 6.1.7601.23403 | Function Discovery Bluetooth Provider Dll
|
| | fdbthproxy.dll | 6.1.7601.23403 | Bluetooth Provider Proxy Dll
|
| | fde.dll | 6.1.7601.17514 | Folder Redirection Snapin Extension
|
| | fdeploy.dll | 6.1.7601.17514 | Folder Redirection Group Policy Extension
|
| | fdpnp.dll | 6.1.7600.16385 | Pnp Provider Dll
|
| | fdproxy.dll | 6.1.7600.16385 | Function Discovery Proxy Dll
|
| | fdssdp.dll | 6.1.7600.16385 | Function Discovery SSDP Provider Dll
|
| | fdwcn.dll | 6.1.7600.16385 | Windows Connect Now - Config Function Discovery Provider DLL
|
| | fdwnet.dll | 6.1.7601.23403 | Function Discovery WNet Provider Dll
|
| | fdwsd.dll | 6.1.7600.16385 | Function Discovery WS Discovery Provider Dll
|
| | feclient.dll | 6.1.7600.16385 | Windows NT File Encryption Client Interfaces
|
| | filemgmt.dll | 6.1.7600.16385 | Services and Shared Folders
|
| | findnetprinters.dll | 6.1.7600.16385 | Find Network Printers COM Component
|
| | firewallapi.dll | 6.1.7601.23403 | Windows Firewall API
|
| | firewallcontrolpanel.dll | 6.1.7601.17514 | Windows Firewall Control Panel
|
| | fltlib.dll | 6.1.7600.16385 | Filter Library
|
| | fm20.dll | 2.1.7017.1 | Microsoft® Forms DLL
|
| | fm20enu.dll | 2.1.7017.1 | Microsoft® Forms International DLL
|
| | fmifs.dll | 6.1.7600.16385 | FM IFS Utility DLL
|
| | fms.dll | 1.1.6000.16384 | Font Management Services
|
| | fontext.dll | 6.1.7601.17514 | Windows Font Folder
|
| | fontsub.dll | 6.1.7601.23930 | Font Subsetting DLL
|
| | fphc.dll | 6.1.7601.17514 | Filtering Platform Helper Class
|
| | framedyn.dll | 6.1.7601.17514 | WMI SDK Provider Framework
|
| | framedynos.dll | 6.1.7601.17514 | WMI SDK Provider Framework
|
| | fthsvc.dll | 6.1.7600.16385 | Microsoft Windows Fault Tolerant Heap Diagnostic Module
|
| | ftlx0411.dll | 4.0.0.4550 | Microsoft(R) Japanese Word Breaker
|
| | ftlx041e.dll | 50.1.7600.16386 | Thai Wordbreaker
|
| | ftsrch.dll | 4.0.0.4553 | Microsoft® Full-Text Search
|
| | fundisc.dll | 6.1.7600.16385 | Function Discovery Dll
|
| | fwcfg.dll | 6.1.7600.16385 | Windows Firewall Configuration Helper
|
| | fwpuclnt.dll | 6.1.7601.23403 | FWP/IPsec User-Mode API
|
| | fwremotesvr.dll | 6.1.7601.23452 | Windows Firewall Remote APIs Server
|
| | fxsapi.dll | 6.1.7601.23403 | Microsoft Fax API Support DLL
|
| | fxscom.dll | 6.1.7601.23403 | Microsoft Fax Server COM Client Interface
|
| | fxscomex.dll | 6.1.7601.23403 | Microsoft Fax Server Extended COM Client Interface
|
| | fxsext32.dll | 6.1.7601.23403 | Microsoft Fax Exchange Command Extension
|
| | fxsresm.dll | 6.1.7601.23403 | Microsoft Fax Resource DLL
|
| | fxsxp32.dll | 6.1.7601.23403 | Microsoft Fax Transport Provider
|
| | gameux.dll | 6.1.7601.23403 | Games Explorer
|
| | gameuxlegacygdfs.dll | 1.0.0.1 | Legacy GDF resource DLL
|
| | gcdef.dll | 6.1.7600.16385 | Game Controllers Default Sheets
|
| | gdi32.dll | 6.1.7601.23914 | GDI Client DLL
|
| | getuname.dll | 6.1.7600.16385 | Unicode name Dll for UCE
|
| | glmf32.dll | 6.1.7600.16385 | OpenGL Metafiling DLL
|
| | glu32.dll | 6.1.7601.23403 | OpenGL Utility Library DLL
|
| | gpapi.dll | 6.1.7601.23452 | Group Policy Client API
|
| | gpedit.dll | 6.1.7601.23932 | GPEdit
|
| | gpprefcl.dll | 6.1.7601.23452 | Group Policy Preference Client
|
| | gpprnext.dll | 6.1.7601.23403 | Group Policy Printer Extension
|
| | gpscript.dll | 6.1.7601.23452 | Script Client Side Extension
|
| | gptext.dll | 6.1.7600.16385 | GPTExt
|
| | hbaapi.dll | 6.1.7601.17514 | HBA API data interface dll for HBA_API_Rev_2-18_2002MAR1.doc
|
| | hcproviders.dll | 6.1.7600.16385 | Action Center Providers
|
| | helppaneproxy.dll | 6.1.7600.16385 | Microsoft® Help Proxy
|
| | hgcpl.dll | 6.1.7601.17514 | HomeGroup Control Panel
|
| | hhsetup.dll | 6.1.7600.16385 | Microsoft® HTML Help
|
| | hid.dll | 6.1.7600.16385 | Hid User Library
|
| | hidserv.dll | 6.1.7600.16385 | HID Service
|
| | hlink.dll | 6.1.7601.23601 | Microsoft Office 2000 component
|
| | hnetcfg.dll | 6.1.7600.16385 | Home Networking Configuration Manager
|
| | hnetmon.dll | 6.1.7600.16385 | Home Networking Monitor DLL
|
| | httpapi.dll | 6.1.7601.17514 | HTTP Protocol Stack API
|
| | htui.dll | 6.1.7600.16385 | Common halftone Color Adjustment Dialogs
|
| | ias.dll | 6.1.7600.16385 | Network Policy Server
|
| | iasacct.dll | 6.1.7601.17514 | NPS Accounting Provider
|
| | iasads.dll | 6.1.7600.16385 | NPS Active Directory Data Store
|
| | iasdatastore.dll | 6.1.7600.16385 | NPS Datastore server
|
| | iashlpr.dll | 6.1.7600.16385 | NPS Surrogate Component
|
| | iasmigplugin.dll | 6.1.7600.16385 | NPS Migration DLL
|
| | iasnap.dll | 6.1.7601.23403 | NPS NAP Provider
|
| | iaspolcy.dll | 6.1.7600.16385 | NPS Pipeline
|
| | iasrad.dll | 6.1.7601.17514 | NPS RADIUS Protocol Component
|
| | iasrecst.dll | 6.1.7601.17514 | NPS XML Datastore Access
|
| | iassam.dll | 6.1.7601.23403 | NPS NT SAM Provider
|
| | iassdo.dll | 6.1.7600.16385 | NPS SDO Component
|
| | iassvcs.dll | 6.1.7600.16385 | NPS Services Component
|
| | icardie.dll | 11.0.9600.16428 | Microsoft Information Card IE Helper
|
| | icardres.dll | 3.0.4506.7082 | Windows CardSpace
|
| | iccvid.dll | 1.10.0.13 | Cinepak® Codec
|
| | icm32.dll | 6.1.7601.23677 | Microsoft Color Management Module (CMM)
|
| | icmp.dll | 6.1.7601.23403 | ICMP DLL
|
| | icmui.dll | 6.1.7601.23403 | Microsoft Color Matching System User Interface DLL
|
| | iconcodecservice.dll | 6.1.7600.16385 | Converts a PNG part of the icon to a legacy bmp icon
|
| | icsigd.dll | 6.1.7600.16385 | Internet Gateway Device properties
|
| | idndl.dll | 6.1.7600.16385 | Downlevel DLL
|
| | idstore.dll | 6.1.7600.16385 | Identity Store
|
| | ieadvpack.dll | 11.0.9600.16428 | ADVPACK
|
| | ieapfltr.dll | 11.0.9600.18858 | Microsoft SmartScreen Filter
|
| | iedkcs32.dll | 18.0.9600.18858 | IEAK branding
|
| | ieetwproxystub.dll | 11.0.9600.18858 | IE ETW Collector Proxy Stub Resources
|
| | ieframe.dll | 11.0.9600.18860 | Internet Browser
|
| | iepeers.dll | 11.0.9600.16428 | Internet Explorer Peer Objects
|
| | iernonce.dll | 11.0.9600.18858 | Extended RunOnce processing with UI
|
| | iertutil.dll | 11.0.9600.18858 | Run time utility for Internet Explorer
|
| | iesetup.dll | 11.0.9600.18858 | IOD Version Map
|
| | iesysprep.dll | 11.0.9600.16428 | IE Sysprep Provider
|
| | ieui.dll | 11.0.9600.18858 | Internet Explorer UI Engine
|
| | ifmon.dll | 6.1.7600.16385 | IF Monitor DLL
|
| | ifsutil.dll | 6.1.7601.23403 | IFS Utility DLL
|
| | ifsutilx.dll | 6.1.7600.16385 | IFS Utility Extension DLL
|
| | ig75icd32.dll | 10.18.10.4013 | OpenGL(R) Driver for Intel(R) Graphics Accelerator
|
| | igd10iumd32.dll | 10.18.10.4013 | User Mode Driver for Intel(R) Graphics Technology
|
| | igd11dxva32.dll | |
|
| | igdail32.dll | 10.18.10.4013 | Application Settings for Intel(R) Graphics Technology
|
| | igdbcl32.dll | 10.18.10.4013 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdde32.dll | |
|
| | igdfcl32.dll | 10.18.10.4013 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdmd32.dll | 10.18.10.4013 | Metrics Discovery API for Intel(R) Graphics Accelerator
|
| | igdrcl32.dll | 10.18.10.4013 | OpenCL User Mode Driver for Intel(R) Graphics Technology
|
| | igdumdim32.dll | 10.18.10.4013 | User Mode Driver for Intel(R) Graphics Technology
|
| | igdusc32.dll | 10.18.10.4013 | Unified Shader Compiler for Intel(R) Graphics Accelerator
|
| | igfx11cmrt32.dll | 4.0.0.1083 | MDF(CM) Runtime DX11 Dynamic Link Library
|
| | igfxcmjit32.dll | 4.0.0.1083 | MDF(CM) JIT Dynamic Link Library
|
| | igfxcmrt32.dll | 4.0.0.1083 | MDF(CM) Runtime Dynamic Link Library
|
| | igfxexps32.dll | 6.15.10.4013 | igfxext Module
|
| | iglhcp32.dll | 3.0.1.26 | iglhcp32 Dynamic Link Library
|
| | iglhsip32.dll | 9.0.30.9000 | iglhsip32 Dynamic Link Library
|
| | iisrstap.dll | 7.5.7601.23403 | IIS Restart API Proxy dll
|
| | iisrtl.dll | 7.5.7601.23403 | IIS RunTime Library
|
| | imagehlp.dll | 6.1.7601.23403 | Windows NT Image Helper
|
| | imageres.dll | 6.1.7600.16385 | Windows Image Resource
|
| | imagesp1.dll | 6.1.7600.16385 | Windows SP1 Image Resource
|
| | imapi.dll | 6.1.7600.16385 | Image Mastering API
|
| | imapi2.dll | 6.1.7601.23403 | Image Mastering API v2
|
| | imapi2fs.dll | 6.1.7601.23403 | Image Mastering File System Imaging API v2
|
| | imgutil.dll | 11.0.9600.16428 | IE plugin image decoder support DLL
|
| | imjp10k.dll | 10.1.7601.23572 | Microsoft IME
|
| | imm32.dll | 6.1.7601.23403 | Multi-User Windows IMM32 API Client DLL
|
| | inetcomm.dll | 6.1.7601.23651 | Microsoft Internet Messaging API Resources
|
| | inetmib1.dll | 6.1.7601.23403 | Microsoft MIB-II subagent
|
| | inetres.dll | 6.1.7601.23651 | Microsoft Internet Messaging API Resources
|
| | infocardapi.dll | 3.0.4506.7082 | Microsoft InfoCards
|
| | inked.dll | 6.1.7601.23403 | Microsoft Tablet PC InkEdit Control
|
| | input.dll | 6.1.7601.23572 | InputSetting DLL
|
| | inseng.dll | 11.0.9600.18858 | Install engine
|
| | intel_opencl_icd32.dll | 2.0.0.0 | OpenCL Client DLL
|
| | intelopencl32.dll | 10.18.10.4013 | Intel(R) OpenCL(TM) Common Runtime Driver
|
| | iologmsg.dll | 6.1.7601.23403 | IO Logging DLL
|
| | ipbusenumproxy.dll | 6.1.7600.16385 | Associated Device Presence Proxy Dll
|
| | iphlpapi.dll | 6.1.7601.23403 | IP Helper API
|
| | ipl.dll | 1.0.0.1 | ipl.dll is the IPLib dispatcher
|
| | ipla6.dll | 1.0.0.1 | iplA6.dll is an IPLib dynamic library
|
| | iplm5.dll | 1.0.0.1 | iplM5.dll is an IPLib dynamic library
|
| | iplm6.dll | 1.0.0.1 | iplM6.dll is an IPLib dynamic library
|
| | iplp5.dll | 1.0.0.1 | iplP5.dll is an IPLib dynamic library
|
| | iplp6.dll | 1.0.0.1 | iplP6.dll is an IPLib dynamic library
|
| | iplpx.dll | 1.0.0.1 | iplPX.dll is an IPLib dynamic library
|
| | iprop.dll | 6.1.7600.16385 | OLE PropertySet Implementation
|
| | iprtprio.dll | 6.1.7601.23947 | IP Routing Protocol Priority DLL
|
| | iprtrmgr.dll | 6.1.7601.23947 | IP Router Manager
|
| | ipsecsnp.dll | 6.1.7600.16385 | IP Security Policy Management Snap-in
|
| | ipsmsnap.dll | 6.1.7601.17514 | IP Security Monitor Snap-in
|
| | ir32_32.dll | 3.24.15.3 | Intel Indeo(R) Video R3.2 32-bit Driver
|
| | ir41_qc.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir41_qcx.dll | 4.30.62.2 | Intel Indeo® Video Interactive Quick Compressor
|
| | ir50_32.dll | 5.2562.15.55 | Intel Indeo® video 5.10
|
| | ir50_qc.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | ir50_qcx.dll | 5.0.63.48 | Intel Indeo® video 5.10 Quick Compressor
|
| | irclass.dll | 6.1.7600.16385 | Infrared Class Coinstaller
|
| | irisco32.dll | |
|
| | iscsicpl.dll | 5.2.3790.1830 | iSCSI Initiator Control Panel Applet
|
| | iscsidsc.dll | 6.1.7600.16385 | iSCSI Discovery api
|
| | iscsied.dll | 6.1.7600.16385 | iSCSI Extension DLL
|
| | iscsium.dll | 6.1.7601.17514 | iSCSI Discovery api
|
| | iscsiwmi.dll | 6.1.7600.16385 | MS iSCSI Initiator WMI Provider
|
| | itircl.dll | 6.1.7601.23948 | Microsoft® InfoTech IR Local DLL
|
| | itss.dll | 6.1.7601.23948 | Microsoft® InfoTech Storage System Library
|
| | itvdata.dll | 6.6.7601.17514 | iTV Data Filters.
|
| | iuseventlog.dll | 1.35.127.1 | Intel(R) TCS Event Log messages definitions
|
| | iyuv_32.dll | 6.1.7601.17514 | Intel Indeo(R) Video YUV Codec
|
| | javascriptcollectionagent.dll | 11.0.9600.18858 | JavaScript Performance Collection Agent
|
| | jscript.dll | 5.8.9600.18858 | Microsoft ® JScript
|
| | jscript9.dll | 11.0.9600.18858 | Microsoft ® JScript
|
| | jscript9diag.dll | 11.0.9600.18858 | Microsoft ® JScript Diagnostics
|
| | jsintl.dll | 6.3.9600.16428 | Windows Globalization
|
| | jsproxy.dll | 11.0.9600.18858 | JScript Proxy Auto-Configuration
|
| | kbd101.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 101
|
| | kbd101a.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101 (Type A)
|
| | kbd101b.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101(Type B)
|
| | kbd101c.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 101(Type C)
|
| | kbd103.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout for 103
|
| | kbd106.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 106
|
| | kbd106n.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for 106
|
| | kbda1.dll | 6.1.7600.16385 | Arabic_English_101 Keyboard Layout
|
| | kbda2.dll | 6.1.7600.16385 | Arabic_2 Keyboard Layout
|
| | kbda3.dll | 6.1.7600.16385 | Arabic_French_102 Keyboard Layout
|
| | kbdal.dll | 6.1.7600.16385 | Albania Keyboard Layout
|
| | kbdarme.dll | 6.1.7600.16385 | Eastern Armenian Keyboard Layout
|
| | kbdarmw.dll | 6.1.7600.16385 | Western Armenian Keyboard Layout
|
| | kbdax2.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for AX2
|
| | kbdaze.dll | 6.1.7601.23403 | Azerbaijan_Cyrillic Keyboard Layout
|
| | kbdazel.dll | 6.1.7601.23403 | Azeri-Latin Keyboard Layout
|
| | kbdbash.dll | 6.1.7601.23403 | Bashkir Keyboard Layout
|
| | kbdbe.dll | 6.1.7600.16385 | Belgian Keyboard Layout
|
| | kbdbene.dll | 6.1.7600.16385 | Belgian Dutch Keyboard Layout
|
| | kbdbgph.dll | 6.1.7600.16385 | Bulgarian Phonetic Keyboard Layout
|
| | kbdbgph1.dll | 6.1.7600.16385 | Bulgarian (Phonetic Traditional) Keyboard Layout
|
| | kbdbhc.dll | 6.1.7600.16385 | Bosnian (Cyrillic) Keyboard Layout
|
| | kbdblr.dll | 6.1.7601.17514 | Belarusian Keyboard Layout
|
| | kbdbr.dll | 6.1.7600.16385 | Brazilian Keyboard Layout
|
| | kbdbu.dll | 6.1.7600.16385 | Bulgarian (Typewriter) Keyboard Layout
|
| | kbdbulg.dll | 6.1.7601.17514 | Bulgarian Keyboard Layout
|
| | kbdca.dll | 6.1.7600.16385 | Canadian Multilingual Keyboard Layout
|
| | kbdcan.dll | 6.1.7600.16385 | Canadian Multilingual Standard Keyboard Layout
|
| | kbdcr.dll | 6.1.7600.16385 | Croatian/Slovenian Keyboard Layout
|
| | kbdcz.dll | 6.1.7600.16385 | Czech Keyboard Layout
|
| | kbdcz1.dll | 6.1.7601.17514 | Czech_101 Keyboard Layout
|
| | kbdcz2.dll | 6.1.7600.16385 | Czech_Programmer's Keyboard Layout
|
| | kbdda.dll | 6.1.7600.16385 | Danish Keyboard Layout
|
| | kbddiv1.dll | 6.1.7600.16385 | Divehi Phonetic Keyboard Layout
|
| | kbddiv2.dll | 6.1.7600.16385 | Divehi Typewriter Keyboard Layout
|
| | kbddv.dll | 6.1.7600.16385 | Dvorak US English Keyboard Layout
|
| | kbdes.dll | 6.1.7600.16385 | Spanish Alernate Keyboard Layout
|
| | kbdest.dll | 6.1.7600.16385 | Estonia Keyboard Layout
|
| | kbdfa.dll | 6.1.7600.16385 | Persian Keyboard Layout
|
| | kbdfc.dll | 6.1.7600.16385 | Canadian French Keyboard Layout
|
| | kbdfi.dll | 6.1.7600.16385 | Finnish Keyboard Layout
|
| | kbdfi1.dll | 6.1.7600.16385 | Finnish-Swedish with Sami Keyboard Layout
|
| | kbdfo.dll | 6.1.7600.16385 | F?roese Keyboard Layout
|
| | kbdfr.dll | 6.1.7600.16385 | French Keyboard Layout
|
| | kbdgae.dll | 6.1.7600.16385 | Gaelic Keyboard Layout
|
| | kbdgeo.dll | 6.1.7601.17514 | Georgian Keyboard Layout
|
| | kbdgeoer.dll | 6.1.7600.16385 | Georgian (Ergonomic) Keyboard Layout
|
| | kbdgeoqw.dll | 6.1.7601.23403 | Georgian (QWERTY) Keyboard Layout
|
| | kbdgkl.dll | 6.1.7601.17514 | Greek_Latin Keyboard Layout
|
| | kbdgr.dll | 6.1.7600.16385 | German Keyboard Layout
|
| | kbdgr1.dll | 6.1.7601.17514 | German_IBM Keyboard Layout
|
| | kbdgrlnd.dll | 6.1.7600.16385 | Greenlandic Keyboard Layout
|
| | kbdhau.dll | 6.1.7600.16385 | Hausa Keyboard Layout
|
| | kbdhe.dll | 6.1.7600.16385 | Greek Keyboard Layout
|
| | kbdhe220.dll | 6.1.7600.16385 | Greek IBM 220 Keyboard Layout
|
| | kbdhe319.dll | 6.1.7600.16385 | Greek IBM 319 Keyboard Layout
|
| | kbdheb.dll | 6.1.7600.16385 | KBDHEB Keyboard Layout
|
| | kbdhela2.dll | 6.1.7600.16385 | Greek IBM 220 Latin Keyboard Layout
|
| | kbdhela3.dll | 6.1.7600.16385 | Greek IBM 319 Latin Keyboard Layout
|
| | kbdhept.dll | 6.1.7600.16385 | Greek_Polytonic Keyboard Layout
|
| | kbdhu.dll | 6.1.7600.16385 | Hungarian Keyboard Layout
|
| | kbdhu1.dll | 6.1.7600.16385 | Hungarian 101-key Keyboard Layout
|
| | kbdibm02.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for IBM 5576-002/003
|
| | kbdibo.dll | 6.1.7600.16385 | Igbo Keyboard Layout
|
| | kbdic.dll | 6.1.7600.16385 | Icelandic Keyboard Layout
|
| | kbdinasa.dll | 6.1.7601.23403 | Assamese (Inscript) Keyboard Layout
|
| | kbdinbe1.dll | 6.1.7601.23403 | Bengali - Inscript (Legacy) Keyboard Layout
|
| | kbdinbe2.dll | 6.1.7601.23403 | Bengali (Inscript) Keyboard Layout
|
| | kbdinben.dll | 6.1.7601.23403 | Bengali Keyboard Layout
|
| | kbdindev.dll | 6.1.7601.23403 | Devanagari Keyboard Layout
|
| | kbdinguj.dll | 6.1.7601.23403 | Gujarati Keyboard Layout
|
| | kbdinhin.dll | 6.1.7601.23403 | Hindi Keyboard Layout
|
| | kbdinkan.dll | 6.1.7601.23403 | Kannada Keyboard Layout
|
| | kbdinmal.dll | 6.1.7601.23403 | Malayalam Keyboard Layout Keyboard Layout
|
| | kbdinmar.dll | 6.1.7601.23403 | Marathi Keyboard Layout
|
| | kbdinori.dll | 6.1.7601.23403 | Oriya Keyboard Layout
|
| | kbdinpun.dll | 6.1.7601.23403 | Punjabi/Gurmukhi Keyboard Layout
|
| | kbdintam.dll | 6.1.7601.23403 | Tamil Keyboard Layout
|
| | kbdintel.dll | 6.1.7601.23403 | Telugu Keyboard Layout
|
| | kbdinuk2.dll | 6.1.7600.16385 | Inuktitut Naqittaut Keyboard Layout
|
| | kbdir.dll | 6.1.7600.16385 | Irish Keyboard Layout
|
| | kbdit.dll | 6.1.7600.16385 | Italian Keyboard Layout
|
| | kbdit142.dll | 6.1.7600.16385 | Italian 142 Keyboard Layout
|
| | kbdiulat.dll | 6.1.7600.16385 | Inuktitut Latin Keyboard Layout
|
| | kbdjpn.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout Stub driver
|
| | kbdkaz.dll | 6.1.7600.16385 | Kazak_Cyrillic Keyboard Layout
|
| | kbdkhmr.dll | 6.1.7600.16385 | Cambodian Standard Keyboard Layout
|
| | kbdkor.dll | 6.1.7600.16385 | KO Hangeul Keyboard Layout Stub driver
|
| | kbdkyr.dll | 6.1.7600.16385 | Kyrgyz Keyboard Layout
|
| | kbdla.dll | 6.1.7600.16385 | Latin-American Spanish Keyboard Layout
|
| | kbdlao.dll | 6.1.7600.16385 | Lao Standard Keyboard Layout
|
| | kbdlk41a.dll | 6.1.7601.17514 | DEC LK411-AJ Keyboard Layout
|
| | kbdlt.dll | 6.1.7600.16385 | Lithuania Keyboard Layout
|
| | kbdlt1.dll | 6.1.7601.17514 | Lithuanian Keyboard Layout
|
| | kbdlt2.dll | 6.1.7600.16385 | Lithuanian Standard Keyboard Layout
|
| | kbdlv.dll | 6.1.7600.16385 | Latvia Keyboard Layout
|
| | kbdlv1.dll | 6.1.7600.16385 | Latvia-QWERTY Keyboard Layout
|
| | kbdmac.dll | 6.1.7600.16385 | Macedonian (FYROM) Keyboard Layout
|
| | kbdmacst.dll | 6.1.7600.16385 | Macedonian (FYROM) - Standard Keyboard Layout
|
| | kbdmaori.dll | 6.1.7601.17514 | Maori Keyboard Layout
|
| | kbdmlt47.dll | 6.1.7600.16385 | Maltese 47-key Keyboard Layout
|
| | kbdmlt48.dll | 6.1.7600.16385 | Maltese 48-key Keyboard Layout
|
| | kbdmon.dll | 6.1.7601.17514 | Mongolian Keyboard Layout
|
| | kbdmonmo.dll | 6.1.7600.16385 | Mongolian (Mongolian Script) Keyboard Layout
|
| | kbdne.dll | 6.1.7600.16385 | Dutch Keyboard Layout
|
| | kbdnec.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800)
|
| | kbdnec95.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800 Windows 95)
|
| | kbdnecat.dll | 6.1.7600.16385 | JP Japanese Keyboard Layout for (NEC PC-9800 on PC98-NX)
|
| | kbdnecnt.dll | 6.1.7600.16385 | JP Japanese NEC PC-9800 Keyboard Layout
|
| | kbdnepr.dll | 6.1.7601.17514 | Nepali Keyboard Layout
|
| | kbdno.dll | 6.1.7600.16385 | Norwegian Keyboard Layout
|
| | kbdno1.dll | 6.1.7600.16385 | Norwegian with Sami Keyboard Layout
|
| | kbdnso.dll | 6.1.7600.16385 | Sesotho sa Leboa Keyboard Layout
|
| | kbdpash.dll | 6.1.7600.16385 | Pashto (Afghanistan) Keyboard Layout
|
| | kbdpl.dll | 6.1.7600.16385 | Polish Keyboard Layout
|
| | kbdpl1.dll | 6.1.7600.16385 | Polish Programmer's Keyboard Layout
|
| | kbdpo.dll | 6.1.7601.17514 | Portuguese Keyboard Layout
|
| | kbdro.dll | 6.1.7600.16385 | Romanian (Legacy) Keyboard Layout
|
| | kbdropr.dll | 6.1.7600.16385 | Romanian (Programmers) Keyboard Layout
|
| | kbdrost.dll | 6.1.7600.16385 | Romanian (Standard) Keyboard Layout
|
| | kbdru.dll | 6.1.7601.23403 | Russian Keyboard Layout
|
| | kbdru1.dll | 6.1.7601.23403 | Russia(Typewriter) Keyboard Layout
|
| | kbdsf.dll | 6.1.7601.17514 | Swiss French Keyboard Layout
|
| | kbdsg.dll | 6.1.7601.17514 | Swiss German Keyboard Layout
|
| | kbdsl.dll | 6.1.7600.16385 | Slovak Keyboard Layout
|
| | kbdsl1.dll | 6.1.7600.16385 | Slovak(QWERTY) Keyboard Layout
|
| | kbdsmsfi.dll | 6.1.7600.16385 | Sami Extended Finland-Sweden Keyboard Layout
|
| | kbdsmsno.dll | 6.1.7600.16385 | Sami Extended Norway Keyboard Layout
|
| | kbdsn1.dll | 6.1.7600.16385 | Sinhala Keyboard Layout
|
| | kbdsorex.dll | 6.1.7600.16385 | Sorbian Extended Keyboard Layout
|
| | kbdsors1.dll | 6.1.7600.16385 | Sorbian Standard Keyboard Layout
|
| | kbdsorst.dll | 6.1.7600.16385 | Sorbian Standard (Legacy) Keyboard Layout
|
| | kbdsp.dll | 6.1.7600.16385 | Spanish Keyboard Layout
|
| | kbdsw.dll | 6.1.7600.16385 | Swedish Keyboard Layout
|
| | kbdsw09.dll | 6.1.7600.16385 | Sinhala - Wij 9 Keyboard Layout
|
| | kbdsyr1.dll | 6.1.7600.16385 | Syriac Standard Keyboard Layout
|
| | kbdsyr2.dll | 6.1.7600.16385 | Syriac Phoenetic Keyboard Layout
|
| | kbdtajik.dll | 6.1.7601.17514 | Tajik Keyboard Layout
|
| | kbdtat.dll | 6.1.7601.23403 | Tatar (Legacy) Keyboard Layout
|
| | kbdth0.dll | 6.1.7600.16385 | Thai Kedmanee Keyboard Layout
|
| | kbdth1.dll | 6.1.7600.16385 | Thai Pattachote Keyboard Layout
|
| | kbdth2.dll | 6.1.7600.16385 | Thai Kedmanee (non-ShiftLock) Keyboard Layout
|
| | kbdth3.dll | 6.1.7600.16385 | Thai Pattachote (non-ShiftLock) Keyboard Layout
|
| | kbdtiprc.dll | 6.1.7600.16385 | Tibetan (PRC) Keyboard Layout
|
| | kbdtuf.dll | 6.1.7601.23403 | Turkish F Keyboard Layout
|
| | kbdtuq.dll | 6.1.7601.23403 | Turkish Q Keyboard Layout
|
| | kbdturme.dll | 6.1.7601.17514 | Turkmen Keyboard Layout
|
| | kbdughr.dll | 6.1.7600.16385 | Uyghur (Legacy) Keyboard Layout
|
| | kbdughr1.dll | 6.1.7601.17514 | Uyghur Keyboard Layout
|
| | kbduk.dll | 6.1.7600.16385 | United Kingdom Keyboard Layout
|
| | kbdukx.dll | 6.1.7600.16385 | United Kingdom Extended Keyboard Layout
|
| | kbdur.dll | 6.1.7600.16385 | Ukrainian Keyboard Layout
|
| | kbdur1.dll | 6.1.7600.16385 | Ukrainian (Enhanced) Keyboard Layout
|
| | kbdurdu.dll | 6.1.7600.16385 | Urdu Keyboard Layout
|
| | kbdus.dll | 6.1.7601.17514 | United States Keyboard Layout
|
| | kbdusa.dll | 6.1.7600.16385 | US IBM Arabic 238_L Keyboard Layout
|
| | kbdusl.dll | 6.1.7600.16385 | Dvorak Left-Hand US English Keyboard Layout
|
| | kbdusr.dll | 6.1.7600.16385 | Dvorak Right-Hand US English Keyboard Layout
|
| | kbdusx.dll | 6.1.7600.16385 | US Multinational Keyboard Layout
|
| | kbduzb.dll | 6.1.7600.16385 | Uzbek_Cyrillic Keyboard Layout
|
| | kbdvntc.dll | 6.1.7600.16385 | Vietnamese Keyboard Layout
|
| | kbdwol.dll | 6.1.7600.16385 | Wolof Keyboard Layout
|
| | kbdyak.dll | 6.1.7601.23403 | Sakha - Russia Keyboard Layout
|
| | kbdyba.dll | 6.1.7600.16385 | Yoruba Keyboard Layout
|
| | kbdycc.dll | 6.1.7600.16385 | Serbian (Cyrillic) Keyboard Layout
|
| | kbdycl.dll | 6.1.7600.16385 | Serbian (Latin) Keyboard Layout
|
| | kerberos.dll | 6.1.7601.23915 | Kerberos Security Package
|
| | kernel32.dll | 6.1.7601.23915 | Windows NT BASE API Client DLL
|
| | kernelbase.dll | 6.1.7601.23915 | Windows NT BASE API Client DLL
|
| | keyiso.dll | 6.1.7600.16385 | CNG Key Isolation Service
|
| | keymgr.dll | 6.1.7600.16385 | Stored User Names and Passwords
|
| | korwbrkr.dll | 6.1.7601.23403 | korwbrkr
|
| | ksuser.dll | 6.1.7601.23403 | User CSA Library
|
| | ktmw32.dll | 6.1.7600.16385 | Windows KTM Win32 Client DLL
|
| | l2gpstore.dll | 6.1.7601.23403 | Policy Storage dll
|
| | l2nacp.dll | 6.1.7600.16385 | Windows Onex Credential Provider
|
| | l2sechc.dll | 6.1.7600.16385 | Layer 2 Security Diagnostics Helper Classes
|
| | laprxy.dll | 12.0.7600.16385 | Windows Media Logagent Proxy
|
| | lfcmp14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | licmgr10.dll | 11.0.9600.16428 | Microsoft® License Manager DLL
|
| | linkinfo.dll | 6.1.7601.23403 | Windows Volume Tracking
|
| | loadperf.dll | 6.1.7600.16385 | Load & Unload Performance Counters
|
| | localsec.dll | 6.1.7601.17514 | Local Users and Groups MMC Snapin
|
| | locationapi.dll | 6.1.7600.16385 | Microsoft Windows Location API
|
| | loghours.dll | 6.1.7600.16385 | Schedule Dialog
|
| | logoncli.dll | 6.1.7601.23403 | Net Logon Client DLL
|
| | lpk.dll | 6.1.7601.23930 | Language Pack
|
| | lpng.dll | |
|
| | lsmproxy.dll | 6.1.7601.23403 | LSM interfaces proxy Dll
|
| | ltdis14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | ltfil14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | ltkrn14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | lttwn14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | ltwvc14n.dll | 14.5.0.1 | LEADTOOLS(r) DLL for Win32
|
| | luainstall.dll | 6.1.7601.17514 | Lua manifest install
|
| | lz32.dll | 6.1.7600.16385 | LZ Expand/Compress API DLL
|
| | magnification.dll | 6.1.7601.23403 | Microsoft Magnification API
|
| | mapi32.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mapistub.dll | 1.0.2536.0 | Extended MAPI 1.0 for Windows NT
|
| | mcewmdrmndbootstrap.dll | 1.3.2302.0 | Windows® Media Center WMDRM-ND Receiver Bridge Bootstrap DLL
|
| | mciavi32.dll | 6.1.7601.17514 | Video For Windows MCI driver
|
| | mcicda.dll | 6.1.7600.16385 | MCI driver for cdaudio devices
|
| | mciqtz32.dll | 6.6.7601.17514 | DirectShow MCI Driver
|
| | mciseq.dll | 6.1.7600.16385 | MCI driver for MIDI sequencer
|
| | mciwave.dll | 6.1.7600.16385 | MCI driver for waveform audio
|
| | mctres.dll | 6.1.7600.16385 | MCT resource DLL
|
| | mdminst.dll | 6.1.7600.16385 | Modem Class Installer
|
| | mediametadatahandler.dll | 6.1.7601.23403 | Media Metadata Handler
|
| | mf.dll | 12.0.7601.23896 | Media Foundation DLL
|
| | mf3216.dll | 6.1.7600.16385 | 32-bit to 16-bit Metafile Conversion DLL
|
| | mfaacenc.dll | 6.1.7601.23403 | Media Foundation AAC Encoder
|
| | mfc100.dll | 10.0.40219.473 | MFCDLL Shared Library - Retail Version
|
| | mfc100chs.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100cht.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100deu.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100enu.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100esn.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100fra.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100ita.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100jpn.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100kor.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100rus.dll | 10.0.40219.473 | MFC Language Specific Resources
|
| | mfc100u.dll | 10.0.40219.473 | MFCDLL Shared Library - Retail Version
|
| | mfc110.dll | 11.0.60610.1 | MFCDLL Shared Library - Retail Version
|
| | mfc110chs.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110cht.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110deu.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110enu.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110esn.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110fra.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110ita.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110jpn.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110kor.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110rus.dll | 11.0.60610.1 | MFC Language Specific Resources
|
| | mfc110u.dll | 11.0.60610.1 | MFCDLL Shared Library - Retail Version
|
| | mfc120.dll | 12.0.40664.0 | MFCDLL Shared Library - Retail Version
|
| | mfc120chs.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120cht.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120deu.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120enu.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120esn.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120fra.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120ita.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120jpn.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120kor.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120rus.dll | 12.0.40664.0 | MFC Language Specific Resources
|
| | mfc120u.dll | 12.0.40664.0 | MFCDLL Shared Library - Retail Version
|
| | mfc140.dll | 14.13.26020.0 | MFCDLL Shared Library - Retail Version
|
| | mfc140chs.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140cht.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140deu.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140enu.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140esn.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140fra.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140ita.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140jpn.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140kor.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140rus.dll | 14.13.26020.0 | MFC Language Specific Resources
|
| | mfc140u.dll | 14.13.26020.0 | MFCDLL Shared Library - Retail Version
|
| | mfc40.dll | 4.1.0.6151 | MFCDLL Shared Library - Retail Version
|
| | mfc40u.dll | 4.1.0.6151 | MFCDLL Shared Library - Retail Version
|
| | mfc42.dll | 6.6.8064.0 | MFCDLL Shared Library - Retail Version
|
| | mfc42u.dll | 6.6.8064.0 | MFCDLL Shared Library - Retail Version
|
| | mfcm100.dll | 10.0.40219.473 | MFC Managed Library - Retail Version
|
| | mfcm100u.dll | 10.0.40219.473 | MFC Managed Library - Retail Version
|
| | mfcm110.dll | 11.0.60610.1 | MFC Managed Library - Retail Version
|
| | mfcm110u.dll | 11.0.60610.1 | MFC Managed Library - Retail Version
|
| | mfcm120.dll | 12.0.40664.0 | MFC Managed Library - Retail Version
|
| | mfcm120u.dll | 12.0.40664.0 | MFC Managed Library - Retail Version
|
| | mfcm140.dll | 14.13.26020.0 | MFC Managed Library - Retail Version
|
| | mfcm140u.dll | 14.13.26020.0 | MFC Managed Library - Retail Version
|
| | mfcsubs.dll | 2001.12.8530.16385 | COM+
|
| | mfds.dll | 12.0.7601.23403 | Media Foundation Direct Show wrapper DLL
|
| | mfdvdec.dll | 6.1.7600.16385 | Media Foundation DV Decoder
|
| | mferror.dll | 12.0.7601.23896 | Media Foundation Error DLL
|
| | mfh264enc.dll | 6.1.7600.16385 | Media Foundation H264 Encoder
|
| | mfmjpegdec.dll | 6.1.7601.23709 | Media Foundation MJPEG Decoder
|
| | mfplat.dll | 12.0.7601.23471 | Media Foundation Platform DLL
|
| | mfplay.dll | 12.0.7601.17514 | Media Foundation Playback API DLL
|
| | mfps.dll | 12.0.7601.23896 | Media Foundation Proxy DLL
|
| | mfreadwrite.dll | 12.0.7601.23403 | Media Foundation ReadWrite DLL
|
| | mfvdsp.dll | 6.1.7601.23403 | Windows Media Foundation Video DSP Components
|
| | mfwmaaec.dll | 6.1.7601.23403 | Windows Media Audio AEC for Media Foundation
|
| | mgmtapi.dll | 6.1.7601.23403 | Microsoft SNMP Manager API (uses WinSNMP)
|
| | midimap.dll | 6.1.7600.16385 | Microsoft MIDI Mapper
|
| | migisol.dll | 6.1.7601.17514 | Migration System Isolation Layer
|
| | miguiresource.dll | 6.1.7600.16385 | MIG wini32 resources
|
| | mimefilt.dll | 2008.0.7601.17514 | MIME Filter
|
| | mlang.dll | 6.1.7600.16385 | Multi Language Support DLL
|
| | mmcbase.dll | 6.1.7601.23892 | MMC Base DLL
|
| | mmci.dll | 6.1.7600.16385 | Media class installer
|
| | mmcico.dll | 6.1.7600.16385 | Media class co-installer
|
| | mmcndmgr.dll | 6.1.7601.23892 | MMC Node Manager DLL
|
| | mmcshext.dll | 6.1.7601.23892 | MMC Shell Extension DLL
|
| | mmdevapi.dll | 6.1.7601.17514 | MMDevice API
|
| | mmres.dll | 6.1.7600.16385 | General Audio Resources
|
| | modemui.dll | 6.1.7600.16385 | Windows Modem Properties
|
| | moricons.dll | 6.1.7600.16385 | Windows NT Setup Icon Resources Library
|
| | mp3dmod.dll | 6.1.7601.23403 | Microsoft MP3 Decoder DMO
|
| | mp43decd.dll | 6.1.7601.23403 | Windows Media MPEG-4 Video Decoder
|
| | mp4sdecd.dll | 6.1.7601.23403 | Windows Media MPEG-4 S Video Decoder
|
| | mpg4decd.dll | 6.1.7601.23403 | Windows Media MPEG-4 Video Decoder
|
| | mpr.dll | 6.1.7600.16385 | Multiple Provider Router DLL
|
| | mprapi.dll | 6.1.7601.17514 | Windows NT MP Router Administration DLL
|
| | mprddm.dll | 6.1.7601.23403 | Demand Dial Manager Supervisor
|
| | mprdim.dll | 6.1.7601.23947 | Dynamic Interface Manager
|
| | mprmsg.dll | 6.1.7600.16385 | Multi-Protocol Router Service Messages DLL
|
| | msaatext.dll | 2.0.10413.0 | Active Accessibility text support
|
| | msac3enc.dll | 6.1.7601.23403 | Microsoft AC-3 Encoder
|
| | msacm32.dll | 6.1.7600.16385 | Microsoft ACM Audio Filter
|
| | msadce.dll | 6.1.7601.23403 | OLE DB Cursor Engine
|
| | msadcer.dll | 6.1.7600.16385 | OLE DB Cursor Engine Resources
|
| | msadcf.dll | 6.1.7601.23789 | Remote Data Services Data Factory
|
| | msadcfr.dll | 6.1.7600.16385 | Remote Data Services Data Factory Resources
|
| | msadco.dll | 6.1.7601.23403 | Remote Data Services Data Control
|
| | msadcor.dll | 6.1.7600.16385 | Remote Data Services Data Control Resources
|
| | msadcs.dll | 6.1.7601.23789 | Remote Data Services ISAPI Library
|
| | msadds.dll | 6.1.7600.16385 | OLE DB Data Shape Provider
|
| | msaddsr.dll | 6.1.7600.16385 | OLE DB Data Shape Provider Resources
|
| | msader15.dll | 6.1.7600.16385 | ActiveX Data Objects Resources
|
| | msado15.dll | 6.1.7601.23789 | ActiveX Data Objects
|
| | msadomd.dll | 6.1.7601.23403 | ActiveX Data Objects (Multi-Dimensional)
|
| | msador15.dll | 6.1.7601.23403 | Microsoft ActiveX Data Objects Recordset
|
| | msadox.dll | 6.1.7601.23403 | ActiveX Data Objects Extensions
|
| | msadrh15.dll | 6.1.7600.16385 | ActiveX Data Objects Rowset Helper
|
| | msafd.dll | 6.1.7600.16385 | Microsoft Windows Sockets 2.0 Service Provider
|
| | msasn1.dll | 6.1.7601.23403 | ASN.1 Runtime APIs
|
| | msaudite.dll | 6.1.7601.23915 | Security Audit Events DLL
|
| | mscandui.dll | 6.1.7600.16385 | MSCANDUI Server DLL
|
| | mscat32.dll | 6.1.7600.16385 | MSCAT32 Forwarder DLL
|
| | msclmd.dll | 6.1.7601.23403 | Microsoft Class Mini-driver
|
| | mscms.dll | 6.1.7601.23677 | Microsoft Color Matching System DLL
|
| | mscoree.dll | 4.0.40305.0 | Microsoft .NET Runtime Execution Engine
|
| | mscorier.dll | 2.0.50727.5483 | Microsoft .NET Runtime IE resources
|
| | mscories.dll | 2.0.50727.5483 | Microsoft .NET IE SECURITY REGISTRATION
|
| | mscpx32r.dll | 6.1.7600.16385 | ODBC Code Page Translator Resources
|
| | mscpxl32.dll | 6.1.7600.16385 | ODBC Code Page Translator
|
| | msctf.dll | 6.1.7601.23915 | MSCTF Server DLL
|
| | msctfmonitor.dll | 6.1.7600.16385 | MsCtfMonitor DLL
|
| | msctfp.dll | 6.1.7600.16385 | MSCTFP Server DLL
|
| | msctfui.dll | 6.1.7600.16385 | MSCTFUI Server DLL
|
| | msdadc.dll | 6.1.7600.16385 | OLE DB Data Conversion Stub
|
| | msdadiag.dll | 6.1.7600.16385 | Built-In Diagnostics
|
| | msdaenum.dll | 6.1.7600.16385 | OLE DB Root Enumerator Stub
|
| | msdaer.dll | 6.1.7600.16385 | OLE DB Error Collection Stub
|
| | msdaora.dll | 6.1.7601.23403 | OLE DB Provider for Oracle
|
| | msdaorar.dll | 6.1.7600.16385 | OLE DB Provider for Oracle Resources
|
| | msdaosp.dll | 6.1.7601.23403 | OLE DB Simple Provider
|
| | msdaprsr.dll | 6.1.7600.16385 | OLE DB Persistence Services Resources
|
| | msdaprst.dll | 6.1.7600.16385 | OLE DB Persistence Services
|
| | msdaps.dll | 6.1.7600.16385 | OLE DB Interface Proxies/Stubs
|
| | msdarem.dll | 6.1.7601.23789 | OLE DB Remote Provider
|
| | msdaremr.dll | 6.1.7600.16385 | OLE DB Remote Provider Resources
|
| | msdart.dll | 6.1.7600.16385 | OLE DB Runtime Routines
|
| | msdasc.dll | 6.1.7600.16385 | OLE DB Service Components Stub
|
| | msdasql.dll | 6.1.7601.17514 | OLE DB Provider for ODBC Drivers
|
| | msdasqlr.dll | 6.1.7600.16385 | OLE DB Provider for ODBC Drivers Resources
|
| | msdatl3.dll | 6.1.7600.16385 | OLE DB Implementation Support Routines
|
| | msdatt.dll | 6.1.7600.16385 | OLE DB Temporary Table Services
|
| | msdaurl.dll | 6.1.7600.16385 | OLE DB RootBinder Stub
|
| | msdelta.dll | 6.1.7600.16385 | Microsoft Patch Engine
|
| | msdfmap.dll | 6.1.7601.17514 | Data Factory Handler
|
| | msdmo.dll | 6.6.7601.17514 | DMO Runtime
|
| | msdrm.dll | 6.1.7601.23403 | Windows Rights Management client
|
| | msdtcprx.dll | 2001.12.8531.23403 | Microsoft Distributed Transaction Coordinator OLE Transactions Interface Proxy DLL
|
| | msdtcuiu.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Administrative DLL
|
| | msdtcvsp1res.dll | 2001.12.8530.16385 | Microsoft Distributed Transaction Coordinator Resources for Vista SP1
|
| | msexch40.dll | 4.0.9756.0 | Microsoft Jet Exchange Isam
|
| | msexcl35.dll | 3.50.3602.5 | Microsoft Jet Excel Isam
|
| | msexcl40.dll | 4.0.9801.2 | Microsoft Jet Excel Isam
|
| | msfeeds.dll | 11.0.9600.18858 | Microsoft Feeds Manager
|
| | msfeedsbs.dll | 11.0.9600.16428 | Microsoft Feeds Background Sync
|
| | msftedit.dll | 5.41.21.2512 | Rich Text Edit Control, v4.1
|
| | mshtml.dll | 11.0.9600.18860 | Microsoft (R) HTML Viewer
|
| | mshtmldac.dll | 11.0.9600.18860 | DAC for Trident DOM
|
| | mshtmled.dll | 11.0.9600.18860 | Microsoft® HTML Editing Component
|
| | mshtmler.dll | 11.0.9600.16428 | Microsoft® HTML Editing Component's Resource DLL
|
| | mshtmlmedia.dll | 11.0.9600.18858 | Microsoft (R) HTML Media DLL
|
| | msi.dll | 5.0.7601.23593 | Windows Installer
|
| | msidcrl30.dll | 6.1.7600.16385 | IDCRL Dynamic Link Library
|
| | msident.dll | 6.1.7600.16385 | Microsoft Identity Manager
|
| | msidle.dll | 6.1.7600.16385 | User Idle Monitor
|
| | msidntld.dll | 6.1.7600.16385 | Microsoft Identity Manager
|
| | msieftp.dll | 6.1.7601.23403 | Microsoft Internet Explorer FTP Folder Shell Extension
|
| | msihnd.dll | 5.0.7601.23593 | Windows® installer
|
| | msiltcfg.dll | 5.0.7600.16385 | Windows Installer Configuration API Stub
|
| | msimg32.dll | 6.1.7600.16385 | GDIEXT Client DLL
|
| | msimsg.dll | 5.0.7601.23593 | Windows® Installer International Messages
|
| | msimtf.dll | 6.1.7600.16385 | Active IMM Server DLL
|
| | msisip.dll | 5.0.7600.16385 | MSI Signature SIP Provider
|
| | msjet35.dll | 3.51.623.4 | Microsoft Jet Engine Library
|
| | msjet40.dll | 4.0.9801.0 | Microsoft Jet Engine Library
|
| | msjetoledb40.dll | 4.0.9801.0 |
|
| | msjint35.dll | 3.50.3602.5 | Microsoft Jet Database Engine International DLL
|
| | msjint40.dll | 4.0.9801.1 | Microsoft Jet Database Engine International DLL
|
| | msjro.dll | 6.1.7601.23403 | Jet and Replication Objects
|
| | msjter35.dll | 3.50.3602.0 | Microsoft Jet Database Engine Error DLL
|
| | msjter40.dll | 4.0.9801.0 | Microsoft Jet Database Engine Error DLL
|
| | msjtes40.dll | 4.0.9801.0 | Microsoft Jet Expression Service
|
| | msls31.dll | 3.10.349.0 | Microsoft Line Services library file
|
| | msltus35.dll | 3.50.3602.5 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msltus40.dll | 4.0.9801.0 | Microsoft Jet Lotus 1-2-3 Isam
|
| | msmpeg2adec.dll | 6.1.7601.23285 | Microsoft DTV-DVD Audio Decoder
|
| | msmpeg2enc.dll | 6.1.7601.23403 | Microsoft MPEG-2 Encoder
|
| | msmpeg2vdec.dll | 12.0.9200.17037 | Microsoft DTV-DVD Video Decoder
|
| | msnetobj.dll | 11.0.7601.23471 | DRM ActiveX Network Object
|
| | msobjs.dll | 6.1.7601.23915 | System object audit names
|
| | msoeacct.dll | 6.1.7600.16385 | Microsoft Internet Account Manager
|
| | msoert2.dll | 6.1.7600.16385 | Microsoft Windows Mail RT Lib
|
| | msorc32r.dll | 6.1.7600.16385 | ODBC Driver for Oracle Resources
|
| | msorcl32.dll | 6.1.7601.23403 | ODBC Driver for Oracle
|
| | mspatcha.dll | 6.1.7600.16385 | Microsoft File Patch Application API
|
| | mspbde40.dll | 4.0.9801.0 | Microsoft Jet Paradox Isam
|
| | mspdox35.dll | 3.50.3602.0 | Microsoft Jet Paradox Isam
|
| | msports.dll | 6.1.7600.16385 | Ports Class Installer
|
| | msrating.dll | 11.0.9600.18858 | Internet Ratings and Local User Management DLL
|
| | msrd2x35.dll | 3.50.3602.0 | Microsoft (R) Red ISAM
|
| | msrd2x40.dll | 4.0.9801.0 | Microsoft (R) Red ISAM
|
| | msrd3x40.dll | 4.0.9801.0 | Microsoft (R) Red ISAM
|
| | msrdc.dll | 6.1.7600.16385 | Remote Differential Compression COM server
|
| | msrdpwebaccess.dll | 6.3.9600.16415 | Microsoft Remote Desktop Services Web Access Control
|
| | msrepl35.dll | 3.51.623.0 | Microsoft Replication Library
|
| | msrepl40.dll | 4.0.9801.0 | Microsoft Replication Library
|
| | msrle32.dll | 6.1.7601.17514 | Microsoft RLE Compressor
|
| | msscntrs.dll | 7.0.7601.23930 | msscntrs.dll
|
| | msscp.dll | 11.0.7601.23471 | Windows Media Secure Content Provider
|
| | mssha.dll | 6.1.7600.16385 | Windows Security Health Agent
|
| | msshavmsg.dll | 6.1.7600.16385 | Windows Security Health Agent Validator Message
|
| | msshooks.dll | 7.0.7601.23930 | MSSHooks.dll
|
| | mssign32.dll | 6.1.7600.16385 | Microsoft Trust Signing APIs
|
| | mssip32.dll | 6.1.7600.16385 | MSSIP32 Forwarder DLL
|
| | mssitlb.dll | 7.0.7601.23930 | mssitlb
|
| | mssph.dll | 7.0.7601.23930 | Microsoft Search Protocol Handler
|
| | mssphtb.dll | 7.0.7601.23930 | Outlook MSSearch Connector
|
| | mssprxy.dll | 7.0.7601.23930 | Microsoft Search Proxy
|
| | mssrch.dll | 7.0.7601.23930 | mssrch.dll
|
| | msstdfmt.dll | 6.0.88.4 | Microsoft Standard Data Formating Object DLL
|
| | msstkprp.dll | 6.0.81.69 | msprop32.ocx
|
| | mssvp.dll | 7.0.7601.23930 | MSSearch Vista Platform
|
| | msswch.dll | 6.1.7600.16385 | msswch
|
| | mstask.dll | 6.1.7601.17514 | Task Scheduler interface DLL
|
| | mstext35.dll | 3.50.3602.0 | Microsoft Jet Text Isam
|
| | mstext40.dll | 4.0.9756.0 | Microsoft Jet Text Isam
|
| | mstscax.dll | 6.3.9600.17930 | Remote Desktop Services ActiveX Client
|
| | msutb.dll | 6.1.7601.17514 | MSUTB Server DLL
|
| | msv1_0.dll | 6.1.7601.23915 | Microsoft Authentication Package v1.0
|
| | msvbvm50.dll | 5.1.43.19 | Visual Basic Virtual Machine
|
| | msvbvm60.dll | 6.0.98.32 | Visual Basic Virtual Machine
|
| | msvcirt.dll | 7.0.7600.16385 | Windows NT IOStreams DLL
|
| | msvcp100.dll | 10.0.40219.473 | Microsoft® C Runtime Library
|
| | msvcp110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcp110_clr0400.dll | 14.0.81.0 | Microsoft® .NET Framework
|
| | msvcp120.dll | 12.0.40664.0 | Microsoft® C Runtime Library
|
| | msvcp120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcp140.dll | 14.13.26020.0 | Microsoft® C Runtime Library
|
| | msvcp140_1.dll | 14.13.26020.0 | Microsoft® C Runtime Library _1
|
| | msvcp60.dll | 7.0.7600.16385 | Windows NT C++ Runtime Library DLL
|
| | msvcr100.dll | 10.0.40219.473 | Microsoft® C Runtime Library
|
| | msvcr100_clr0400.dll | 14.0.81.0 | Microsoft® .NET Framework
|
| | msvcr110.dll | 11.0.51106.1 | Microsoft® C Runtime Library
|
| | msvcr110_clr0400.dll | 14.0.81.0 | Microsoft® .NET Framework
|
| | msvcr120.dll | 12.0.40664.0 | Microsoft® C Runtime Library
|
| | msvcr120_clr0400.dll | 12.0.52512.0 | Microsoft® C Runtime Library
|
| | msvcrt.dll | 7.0.7601.23403 | Windows NT CRT DLL
|
| | msvcrt20.dll | 2.12.0.0 | Microsoft® C Runtime Library
|
| | msvcrt40.dll | 6.1.7600.16385 | VC 4.x CRT DLL (Forwarded to msvcrt.dll)
|
| | msvfw32.dll | 6.1.7601.17514 | Microsoft Video for Windows DLL
|
| | msvidc32.dll | 6.1.7601.17514 | Microsoft Video 1 Compressor
|
| | msvidctl.dll | 6.5.7601.23569 | ActiveX control for streaming video
|
| | mswdat10.dll | 4.0.9801.0 | Microsoft Jet Sort Tables
|
| | mswmdm.dll | 12.0.7600.16385 | Windows Media Device Manager Core
|
| | mswsock.dll | 6.1.7601.23451 | Microsoft Windows Sockets 2.0 Service Provider
|
| | mswstr10.dll | 4.0.9801.1 | Microsoft Jet Sort Library
|
| | msxactps.dll | 6.1.7600.16385 | OLE DB Transaction Proxies/Stubs
|
| | msxbde40.dll | 4.0.9801.0 | Microsoft Jet xBASE Isam
|
| | msxbse35.dll | 3.50.3602.0 | Microsoft Jet xBase Isam
|
| | msxml3.dll | 8.110.7601.23648 | MSXML 3.0 SP11
|
| | msxml3r.dll | 8.110.7601.23648 | XML Resources
|
| | msxml4.dll | 4.30.2117.0 | MSXML 4.0 SP3
|
| | msxml4r.dll | 4.30.2100.0 | MSXML 4.0 SP3 Resources
|
| | msxml6.dll | 6.30.7601.23403 | MSXML 6.0 SP3
|
| | msxml6r.dll | 6.30.7601.23403 | XML Resources
|
| | msyuv.dll | 6.1.7601.17514 | Microsoft UYVY Video Decompressor
|
| | mtxclu.dll | 2001.12.8531.23403 | Microsoft Distributed Transaction Coordinator Failover Clustering Support DLL
|
| | mtxdm.dll | 2001.12.8530.16385 | COM+
|
| | mtxex.dll | 2001.12.8530.16385 | COM+
|
| | mtxlegih.dll | 2001.12.8530.16385 | COM+
|
| | mtxoci.dll | 2001.12.8531.23403 | Microsoft Distributed Transaction Coordinator Database Support DLL for Oracle
|
| | muifontsetup.dll | 6.1.7601.17514 | MUI Callback for font registry settings
|
| | mycomput.dll | 6.1.7600.16385 | Computer Management
|
| | mydocs.dll | 6.1.7601.17514 | My Documents Folder UI
|
| | napcrypt.dll | 6.1.7601.17514 | NAP Cryptographic API helper
|
| | napdsnap.dll | 6.1.7601.17514 | NAP GPEdit Extension
|
| | naphlpr.dll | 6.1.7601.17514 | NAP client config API helper
|
| | napinsp.dll | 6.1.7600.16385 | E-mail Naming Shim Provider
|
| | napipsec.dll | 6.1.7600.16385 | NAP IPSec Enforcement Client
|
| | napmontr.dll | 6.1.7600.16385 | NAP Netsh Helper
|
| | nativehooks.dll | 6.1.7600.16385 | Microsoft Narrator Native hook handler
|
| | naturallanguage6.dll | 6.1.7601.17514 | Natural Language Development Platform 6
|
| | ncdprop.dll | 6.1.7600.16385 | Advanced network device properties
|
| | nci.dll | 6.1.7601.23403 | CoInstaller: NET
|
| | ncobjapi.dll | 6.1.7600.16385 | Microsoft® Windows® Operating System
|
| | ncrypt.dll | 6.1.7601.23915 | Windows cryptographic library
|
| | ncryptui.dll | 6.1.7601.23403 | Windows cryptographic key protection UI library
|
| | ncsi.dll | 6.1.7601.23403 | Network Connectivity Status Indicator
|
| | nddeapi.dll | 6.1.7600.16385 | Network DDE Share Management APIs
|
| | ndfapi.dll | 6.1.7600.16385 | Network Diagnostic Framework Client API
|
| | ndfetw.dll | 6.1.7600.16385 | Network Diagnostic Engine Event Interface
|
| | ndfhcdiscovery.dll | 6.1.7600.16385 | Network Diagnostic Framework HC Discovery API
|
| | ndiscapcfg.dll | 6.1.7600.16385 | NdisCap Notify Object
|
| | ndishc.dll | 6.1.7600.16385 | NDIS Helper Classes
|
| | ndproxystub.dll | 6.1.7600.16385 | Network Diagnostic Engine Proxy/Stub
|
| | negoexts.dll | 6.1.7600.16385 | NegoExtender Security Package
|
| | netapi32.dll | 6.1.7601.23403 | Net Win32 API DLL
|
| | netbios.dll | 6.1.7600.16385 | NetBIOS Interface Library
|
| | netcenter.dll | 6.1.7601.17514 | Network Center control panel
|
| | netcfgx.dll | 6.1.7601.23403 | Network Configuration Objects
|
| | netcorehc.dll | 6.1.7601.23403 | Networking Core Diagnostics Helper Classes
|
| | netdiagfx.dll | 6.1.7601.17514 | Network Diagnostic Framework
|
| | netevent.dll | 6.1.7601.23403 | Net Event Handler
|
| | netfxperf.dll | 4.0.40305.0 | Extensible Performance Counter Shim
|
| | neth.dll | 6.1.7600.16385 | Net Help Messages DLL
|
| | netid.dll | 6.1.7601.17514 | System Control Panel Applet; Network ID Page
|
| | netiohlp.dll | 6.1.7601.23403 | Netio Helper DLL
|
| | netjoin.dll | 6.1.7601.23403 | Domain Join DLL
|
| | netlogon.dll | 6.1.7601.23403 | Net Logon Services DLL
|
| | netmsg.dll | 6.1.7600.16385 | Net Messages DLL
|
| | netplwiz.dll | 6.1.7601.17514 | Map Network Drives/Network Places Wizard
|
| | netprof.dll | 6.1.7600.16385 | Network Profile Management UI
|
| | netprofm.dll | 6.1.7601.23403 | Network List Manager
|
| | netshell.dll | 6.1.7601.23403 | Network Connections Shell
|
| | netutils.dll | 6.1.7601.17514 | Net Win32 API Helpers DLL
|
| | networkexplorer.dll | 6.1.7601.23403 | Network Explorer
|
| | networkitemfactory.dll | 6.1.7601.23403 | NetworkItem Factory
|
| | networkmap.dll | 6.1.7601.23403 | Network Map
|
| | newdev.dll | 6.0.5054.0 | Add Hardware Device Library
|
| | nlaapi.dll | 6.1.7601.23403 | Network Location Awareness 2
|
| | nlhtml.dll | 2008.0.7600.16385 | HTML filter
|
| | nlmgp.dll | 6.1.7600.16385 | Network List Manager Snapin
|
| | nlmsprep.dll | 6.1.7601.23403 | Network List Manager Sysprep Module
|
| | nlsbres.dll | 6.1.7601.23572 | NLSBuild resource DLL
|
| | nlsdata0000.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0001.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0002.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0003.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0007.dll | 6.1.7600.16385 | Microsoft German Natural Language Server Data and Code
|
| | nlsdata0009.dll | 6.1.7600.16385 | Microsoft English Natural Language Server Data and Code
|
| | nlsdata000a.dll | 6.1.7600.16385 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlsdata000c.dll | 6.1.7600.16385 | Microsoft French Natural Language Server Data and Code
|
| | nlsdata000d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata000f.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0010.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlsdata0013.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0018.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0019.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata001d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0020.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0021.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0022.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0024.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0026.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0027.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata002a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0039.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata003e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0045.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0046.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0047.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0049.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004c.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata004e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0414.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0416.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0816.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata081a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdata0c1a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsdl.dll | 6.1.7600.16385 | Nls Downlevel DLL
|
| | nlslexicons0001.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0002.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0003.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0007.dll | 6.1.7600.16385 | Microsoft German Natural Language Server Data and Code
|
| | nlslexicons0009.dll | 6.1.7600.16385 | Microsoft English Natural Language Server Data and Code
|
| | nlslexicons000a.dll | 6.1.7600.16385 | Microsoft Spanish Natural Language Server Data and Code
|
| | nlslexicons000c.dll | 6.1.7600.16385 | Microsoft French Natural Language Server Data and Code
|
| | nlslexicons000d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons000f.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0010.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | nlslexicons0013.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0018.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0019.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons001d.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0020.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0021.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0022.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0024.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0026.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0027.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons002a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0039.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons003e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0045.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0046.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0047.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0049.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004b.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004c.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons004e.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0414.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0416.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0816.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons081a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlslexicons0c1a.dll | 6.1.7600.16385 | Microsoft Neutral Natural Language Server Data and Code
|
| | nlsmodels0011.dll | 6.1.7600.16385 | Microsoft Japanese Natural Language Server Data and Code
|
| | normaliz.dll | 6.1.7600.16385 | Unicode Normalization DLL
|
| | npmproxy.dll | 6.1.7601.23403 | Network List Manager Proxy
|
| | nshhttp.dll | 6.1.7600.16385 | HTTP netsh DLL
|
| | nshipsec.dll | 6.1.7601.17514 | Net Shell IP Security helper DLL
|
| | nshwfp.dll | 6.1.7601.23403 | Windows Filtering Platform Netsh Helper
|
| | nsi.dll | 6.1.7601.23889 | NSI User-mode interface DLL
|
| | ntdll.dll | 6.1.7601.23915 | NT Layer DLL
|
| | ntdsapi.dll | 6.1.7600.16385 | Active Directory Domain Services API
|
| | ntlanman.dll | 6.1.7601.17514 | Microsoft® Lan Manager
|
| | ntlanui2.dll | 6.1.7600.16385 | Network object shell UI
|
| | ntmarta.dll | 6.1.7600.16385 | Windows NT MARTA provider
|
| | ntprint.dll | 6.1.7601.23889 | Spooler Setup DLL
|
| | ntshrui.dll | 6.1.7601.23403 | Shell extensions for sharing
|
| | ntvdm64.dll | 6.1.7601.23915 | 16-bit Emulation on NT64
|
| | nvapi.dll | 9.18.13.4752 | NVIDIA NVAPI Library, Version 347.52
|
| | nvaudcap32v.dll | 1.2.27.0 | NVIDIA Virtual Audio Driver
|
| | nvcompiler.dll | 8.17.13.4752 | NVIDIA Compiler, Version 347.52
|
| | nvcuda.dll | 8.17.13.4752 | NVIDIA CUDA Driver, Version 347.52
|
| | nvcuvid.dll | 7.17.13.4752 | NVIDIA CUDA Video Decode API, Version 347.52
|
| | nvd3dum.dll | 9.18.13.4752 | NVIDIA WDDM D3D Driver, Version 347.52
|
| | nvencodeapi.dll | 6.14.13.4752 | NVIDIA Video Encoder API, Version 3.0
|
| | nvfbc.dll | 6.14.13.4752 | NVIDIA Frame Buffer Capture Library, Version
|
| | nvifr.dll | 6.14.13.4752 | NVIDIA In-band Frame Rendering Library, Version
|
| | nvifropengl.dll | 9.18.13.4752 | NVIDIA OpenGL In-band Frame Readback Library, Version
|
| | nvinit.dll | 9.18.13.4752 | NVIDIA shim initialization dll, Version 347.52
|
| | nvkeyvdd.dll | |
|
| | nvoglshim32.dll | 9.18.13.4752 | NVIDIA OpenGL Shim Driver, Version 347.52
|
| | nvoglv32.dll | 9.18.13.4752 | NVIDIA Compatible OpenGL ICD
|
| | nvopencl.dll | 8.17.13.4752 | NVIDIA CUDA 7.0.23 OpenCL 1.1 Driver, Version 347.52
|
| | nvspbridge.dll | 17.12.8.0 | NVIDIA GFE - Notification Bridge
|
| | nvspcap.dll | 17.12.8.0 | NVIDIA Capture Server Proxy
|
| | nvumdshim.dll | 9.18.13.4752 | NVIDIA D3D Shim Driver, Version 347.52
|
| | nvwgf2um.dll | 9.18.13.4752 | NVIDIA D3D10 Driver, Version 347.52
|
| | objsel.dll | 6.1.7601.23403 | Object Picker Dialog
|
| | occache.dll | 11.0.9600.18858 | Object Control Viewer
|
| | ocsetapi.dll | 6.1.7601.17514 | Windows Optional Component Setup API
|
| | odbc32.dll | 6.1.7601.23403 | ODBC Driver Manager
|
| | odbc32gt.dll | 6.1.7600.16385 | ODBC Driver Generic Thunk
|
| | odbcbcp.dll | 6.1.7600.16385 | BCP for ODBC
|
| | odbcconf.dll | 6.1.7601.17514 | ODBC Driver Configuration Program
|
| | odbccp32.dll | 6.1.7601.23403 | ODBC Installer
|
| | odbccr32.dll | 6.1.7601.23403 | ODBC Cursor Library
|
| | odbccu32.dll | 6.1.7601.23403 | ODBC Cursor Library
|
| | odbcint.dll | 6.1.7600.16385 | ODBC Resources
|
| | odbcji32.dll | 6.1.7600.16385 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbcjt32.dll | 6.1.7601.23403 | Microsoft ODBC Desktop Driver Pack 3.5
|
| | odbctrac.dll | 6.1.7601.23403 | ODBC Driver Manager Trace
|
| | oddbse32.dll | 6.1.7600.16385 | ODBC (3.0) driver for DBase
|
| | odexl32.dll | 6.1.7600.16385 | ODBC (3.0) driver for Excel
|
| | odfox32.dll | 6.1.7600.16385 | ODBC (3.0) driver for FoxPro
|
| | odpdx32.dll | 6.1.7600.16385 | ODBC (3.0) driver for Paradox
|
| | odtext32.dll | 6.1.7600.16385 | ODBC (3.0) driver for text files
|
| | offfilt.dll | 2008.0.7600.16385 | OFFICE Filter
|
| | ogldrv.dll | 6.1.7600.16385 | MSOGL
|
| | ole2.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | ole2disp.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole2nls.dll | 2.10.3050.1 | OLE 2.1 16/32 Interoperability Library
|
| | ole32.dll | 6.1.7601.23889 | Microsoft OLE for Windows
|
| | oleacc.dll | 7.0.0.0 | Active Accessibility Core Component
|
| | oleacchooks.dll | 7.0.0.0 | Active Accessibility Event Hooks Library
|
| | oleaccrc.dll | 7.0.0.0 | Active Accessibility Resource DLL
|
| | oleaut32.dll | 6.1.7601.23775 |
|
| | olecli32.dll | 6.1.7600.16385 | Object Linking and Embedding Client Library
|
| | oledb32.dll | 6.1.7601.17514 | OLE DB Core Services
|
| | oledb32r.dll | 6.1.7600.16385 | OLE DB Core Services Resources
|
| | oledlg.dll | 6.1.7600.16385 | OLE User Interface Support
|
| | oleprn.dll | 6.1.7601.23403 | Oleprn DLL
|
| | olepro32.dll | 6.1.7601.23452 |
|
| | oleres.dll | 6.1.7601.23889 | Ole resource dll
|
| | olesvr32.dll | 6.1.7600.16385 | Object Linking and Embedding Server Library
|
| | olethk32.dll | 6.1.7601.17514 | Microsoft OLE for Windows
|
| | onex.dll | 6.1.7601.17514 | IEEE 802.1X supplicant library
|
| | onexui.dll | 6.1.7601.17514 | IEEE 802.1X supplicant UI library
|
| | onlineidcpl.dll | 6.1.7601.17514 | Online IDs Control Panel
|
| | oobefldr.dll | 6.1.7601.17514 | Getting Started
|
| | opcservices.dll | 6.1.7601.17514 | Native Code OPC Services Library
|
| | opencl.dll | 2.0.0.0 | OpenCL Client DLL
|
| | opengl32.dll | 6.1.7601.23403 | OpenGL Client DLL
|
| | osbaseln.dll | 6.1.7600.16385 | Service Reporting API
|
| | osuninst.dll | 6.1.7600.16385 | Uninstall Interface
|
| | p2p.dll | 6.1.7601.23403 | Peer-to-Peer Grouping
|
| | p2pcollab.dll | 6.1.7601.23403 | Peer-to-Peer Collaboration
|
| | p2pgraph.dll | 6.1.7601.23403 | Peer-to-Peer Graphing
|
| | p2pnetsh.dll | 6.1.7601.23403 | Peer-to-Peer NetSh Helper
|
| | packager.dll | 6.1.7601.23403 | Object Packager2
|
| | panmap.dll | 6.1.7600.16385 | PANOSE(tm) Font Mapper
|
| | pautoenr.dll | 6.1.7600.16385 | Auto Enrollment DLL
|
| | pcaui.dll | 6.1.7601.23403 | Program Compatibility Assistant User Interface Module
|
| | pcwum.dll | 6.1.7600.16385 | Performance Counters for Windows Native DLL
|
| | pdh.dll | 6.1.7601.23717 | Windows Performance Data Helper DLL
|
| | pdhui.dll | 6.1.7601.23841 | PDH UI
|
| | peerdist.dll | 6.1.7600.16385 | BranchCache Client Library
|
| | peerdistsh.dll | 6.1.7600.16385 | BranchCache Netshell Helper
|
| | pegrpse.dll | 7.1.0.0 | ProEssentials Standard Charting DLL
|
| | perfcentercpl.dll | 6.1.7601.23403 | Performance Center
|
| | perfctrs.dll | 6.1.7601.23403 | Performance Counters
|
| | perfdisk.dll | 6.1.7601.23403 | Windows Disk Performance Objects DLL
|
| | perfnet.dll | 6.1.7601.23403 | Windows Network Service Performance Objects DLL
|
| | perfos.dll | 6.1.7601.23403 | Windows System Performance Objects DLL
|
| | perfproc.dll | 6.1.7601.23403 | Windows System Process Performance Objects DLL
|
| | perfts.dll | 6.1.7601.17514 | Windows Remote Desktop Services Performance Objects
|
| | photometadatahandler.dll | 6.1.7600.16385 | Photo Metadata Handler
|
| | photowiz.dll | 6.1.7601.23403 | Photo Printing Wizard
|
| | pid.dll | 6.1.7600.16385 | Microsoft PID
|
| | pidgenx.dll | 6.1.7600.16385 | Pid Generation
|
| | pifmgr.dll | 6.1.7601.17514 | Windows NT PIF Manager Icon Resources Library
|
| | pku2u.dll | 6.1.7601.23403 | Pku2u Security Package
|
| | pla.dll | 6.1.7601.23717 | Performance Logs & Alerts
|
| | playsndsrv.dll | 6.1.7600.16385 | PlaySound Service
|
| | pmcsnap.dll | 6.1.7600.16385 | pmcsnap dll
|
| | pngfilt.dll | 11.0.9600.16428 | IE PNG plugin image decoder
|
| | pnidui.dll | 6.1.7601.23403 | Network System Icon
|
| | pnpsetup.dll | 6.1.7600.16385 | Pnp installer for CMI
|
| | pnrpnsp.dll | 6.1.7600.16385 | PNRP Name Space Provider
|
| | polstore.dll | 6.1.7601.23452 | Policy Storage dll
|
| | portabledeviceapi.dll | 6.1.7601.17514 | Windows Portable Device API Components
|
| | portabledeviceclassextension.dll | 6.1.7600.16385 | Windows Portable Device Class Extension Component
|
| | portabledeviceconnectapi.dll | 6.1.7600.16385 | Portable Device Connection API Components
|
| | portabledevicestatus.dll | 6.1.7601.17514 | Microsoft Windows Portable Device Status Provider
|
| | portabledevicesyncprovider.dll | 6.1.7601.17514 | Microsoft Windows Portable Device Provider.
|
| | portabledevicetypes.dll | 6.1.7600.16385 | Windows Portable Device (Parameter) Types Component
|
| | portabledevicewiacompat.dll | 6.1.7600.16385 | PortableDevice WIA Compatibility Driver
|
| | portabledevicewmdrm.dll | 6.1.7600.16385 | Windows Portable Device WMDRM Component
|
| | pots.dll | 6.1.7600.16385 | Power Troubleshooter
|
| | powercpl.dll | 6.1.7601.17514 | Power Options Control Panel
|
| | powrprof.dll | 6.1.7601.23403 | Power Profile Helper DLL
|
| | ppcsnap.dll | 6.1.7600.16385 | ppcsnap DLL
|
| | presentationcffrasterizernative_v0300.dll | 3.0.6920.8684 | WinFX OpenType/CFF Rasterizer
|
| | presentationhostproxy.dll | 4.0.31106.0 | Windows Presentation Foundation Host Proxy
|
| | presentationnative_v0300.dll | 3.0.6920.4902 | PresentationNative_v0300.dll
|
| | prflbmsg.dll | 6.1.7600.16385 | Perflib Event Messages
|
| | printui.dll | 6.1.7601.23403 | Printer Settings User Interface
|
| | prncache.dll | 6.1.7601.23403 | Print UI Cache
|
| | prnfldr.dll | 6.1.7601.17514 | prnfldr dll
|
| | prnntfy.dll | 6.1.7600.16385 | prnntfy DLL
|
| | prntvpt.dll | 6.1.7601.17514 | Print Ticket Services Module
|
| | profapi.dll | 6.1.7600.16385 | User Profile Basic API
|
| | propsys.dll | 7.0.7601.23403 | Microsoft Property System
|
| | provsvc.dll | 6.1.7601.17514 | Windows HomeGroup
|
| | provthrd.dll | 6.1.7600.16385 | WMI Provider Thread & Log Library
|
| | psapi.dll | 6.1.7600.16385 | Process Status Helper
|
| | psbase.dll | 6.1.7600.16385 | Protected Storage default provider
|
| | pshed.dll | 6.1.7600.16385 | Platform Specific Hardware Error Driver
|
| | psisdecd.dll | 6.6.7601.23403 | Microsoft SI/PSI parser for MPEG2 based networks.
|
| | pstorec.dll | 6.1.7600.16385 | Protected Storage COM interfaces
|
| | pstorsvc.dll | 6.1.7600.16385 | Protected storage server
|
| | puiapi.dll | 6.1.7600.16385 | puiapi DLL
|
| | puiobj.dll | 6.1.7601.17514 | PrintUI Objects DLL
|
| | pwrshplugin.dll | 6.1.7600.16385 | pwrshplugin.dll
|
| | qagent.dll | 6.1.7601.17514 | Quarantine Agent Proxy
|
| | qasf.dll | 12.0.7601.23403 | DirectShow ASF Support
|
| | qcap.dll | 6.6.7601.17514 | DirectShow Runtime.
|
| | qcliprov.dll | 6.1.7601.17514 | Quarantine Client WMI Provider
|
| | qdv.dll | 6.6.7601.23403 | DirectShow Runtime.
|
| | qdvd.dll | 6.6.7601.23471 | DirectShow DVD PlayBack Runtime.
|
| | qedit.dll | 6.6.7601.23403 | DirectShow Editing.
|
| | qedwipes.dll | 6.6.7600.16385 | DirectShow Editing SMPTE Wipes
|
| | qmgrprxy.dll | 7.5.7600.16385 | Background Intelligent Transfer Service Proxy
|
| | qshvhost.dll | 6.1.7601.17514 | Quarantine SHV Host
|
| | qsvrmgmt.dll | 6.1.7601.17514 | Quarantine Server Management
|
| | quartz.dll | 6.6.7601.23709 | DirectShow Runtime.
|
| | query.dll | 6.1.7601.23930 | Content Index Utility DLL
|
| | qutil.dll | 6.1.7601.17514 | Quarantine Utilities
|
| | qwave.dll | 6.1.7600.16385 | Windows NT
|
| | racengn.dll | 6.1.7601.17514 | Reliability analysis metrics calculation engine
|
| | racpldlg.dll | 6.1.7601.23403 | Remote Assistance Contact List
|
| | radardt.dll | 6.1.7600.16385 | Microsoft Windows Resource Exhaustion Detector
|
| | radarrs.dll | 6.1.7600.16385 | Microsoft Windows Resource Exhaustion Resolver
|
| | rasadhlp.dll | 6.1.7600.16385 | Remote Access AutoDial Helper
|
| | rasapi32.dll | 6.1.7601.23403 | Remote Access API
|
| | rascfg.dll | 6.1.7601.23403 | RAS Configuration Objects
|
| | raschap.dll | 6.1.7601.17514 | Remote Access PPP CHAP
|
| | rasctrs.dll | 6.1.7600.16385 | Windows NT Remote Access Perfmon Counter dll
|
| | rasdiag.dll | 6.1.7601.23403 | RAS Diagnostics Helper Classes
|
| | rasdlg.dll | 6.1.7601.23403 | Remote Access Common Dialog API
|
| | rasgcw.dll | 6.1.7600.16385 | RAS Wizard Pages
|
| | rasman.dll | 6.1.7600.16385 | Remote Access Connection Manager
|
| | rasmm.dll | 6.1.7600.16385 | RAS Media Manager
|
| | rasmontr.dll | 6.1.7600.16385 | RAS Monitor DLL
|
| | rasmxs.dll | 6.1.7601.23403 | Remote Access Device DLL for modems, PADs and switches
|
| | rasplap.dll | 6.1.7601.23403 | RAS PLAP Credential Provider
|
| | rasppp.dll | 6.1.7601.23403 | Remote Access PPP
|
| | rasser.dll | 6.1.7601.23403 | Remote Access Media DLL for COM ports
|
| | rastapi.dll | 6.1.7601.17514 | Remote Access TAPI Compliance Layer
|
| | rastls.dll | 6.1.7601.23403 | Remote Access PPP EAP-TLS
|
| | rdpcore.dll | 6.1.7601.23892 | RDP Core DLL
|
| | rdpd3d.dll | 6.1.7601.17514 | RDP Direct3D Remoting DLL
|
| | rdpencom.dll | 6.1.7601.17514 | RDPSRAPI COM Objects
|
| | rdpendp.dll | 6.1.7601.23403 | RDP Audio Endpoint
|
| | rdpendp_winip.dll | 6.2.9200.16398 | RDP Audio Endpoint
|
| | rdprefdrvapi.dll | 6.1.7601.17514 | Reflector Driver API
|
| | rdvgumd32.dll | 6.1.7601.17514 | Microsoft vGPU
|
| | rdvidcrl.dll | 6.3.9600.16415 | Remote Desktop Services Client for Microsoft Online Services
|
| | reagent.dll | 6.1.7601.23403 | Microsoft Windows Recovery Agent DLL
|
| | regapi.dll | 6.1.7601.23403 | Registry Configuration APIs
|
| | regctrl.dll | 6.1.7600.16385 | RegCtrl
|
| | remotepg.dll | 6.1.7601.17514 | Remote Sessions CPL Extension
|
| | resampledmo.dll | 6.1.7601.23403 | Windows Media Resampler
|
| | resutils.dll | 6.1.7601.23403 | Microsoft Cluster Resource Utility DLL
|
| | rgb9rast.dll | 6.1.7600.16385 | Microsoft® Windows® Operating System
|
| | riched20.dll | 5.31.23.1230 | Rich Text Edit Control, v3.1
|
| | riched32.dll | 6.1.7601.17514 | Wrapper Dll for Richedit 1.0
|
| | rnr20.dll | 6.1.7600.16385 | Windows Socket2 NameSpace DLL
|
| | rpcdiag.dll | 6.1.7600.16385 | RPC Diagnostics
|
| | rpchttp.dll | 6.1.7601.23915 | RPC HTTP DLL
|
| | rpcndfp.dll | 1.0.0.1 | RPC NDF Helper Class
|
| | rpcns4.dll | 6.1.7600.16385 | Remote Procedure Call Name Service Client
|
| | rpcnsh.dll | 6.1.7600.16385 | RPC Netshell Helper
|
| | rpcrt4.dll | 6.1.7601.23915 | Remote Procedure Call Runtime
|
| | rpcrtremote.dll | 6.1.7601.17514 | Remote RPC Extension
|
| | rsaenh.dll | 6.1.7600.16385 | Microsoft Enhanced Cryptographic Provider
|
| | rscricon.dll | 1.10.0.0 | Realtek Card Reader Icon Dll
|
| | rshx32.dll | 6.1.7601.23403 | Security Shell Extension
|
| | rstrtmgr.dll | 6.1.7600.16385 | Restart Manager
|
| | rtffilt.dll | 2008.0.7600.16385 | RTF Filter
|
| | rtm.dll | 6.1.7601.23947 | Routing Table Manager
|
| | rtutils.dll | 6.1.7601.17514 | Routing Utilities
|
| | samcli.dll | 6.1.7601.17514 | Security Accounts Manager Client DLL
|
| | samlib.dll | 6.1.7601.23677 | SAM Library DLL
|
| | sampleres.dll | 6.1.7600.16385 | Microsoft Samples
|
| | sas.dll | 6.1.7600.16385 | WinLogon Software SAS Library
|
| | sbe.dll | 6.6.7601.23403 | DirectShow Stream Buffer Filter.
|
| | sbeio.dll | 12.0.7601.23403 | Stream Buffer IO DLL
|
| | sberes.dll | 6.6.7600.16385 | DirectShow Stream Buffer Filter Resouces.
|
| | scansetting.dll | 6.1.7601.17514 | Microsoft® Windows(TM) ScanSettings Profile and Scanning implementation
|
| | scarddlg.dll | 6.1.7601.23403 | SCardDlg - Smart Card Common Dialog
|
| | scecli.dll | 6.1.7601.23403 | Windows Security Configuration Editor Client Engine
|
| | scesrv.dll | 6.1.7601.23403 | Windows Security Configuration Editor Engine
|
| | schannel.dll | 6.1.7601.23915 | TLS / SSL Security Provider
|
| | schedcli.dll | 6.1.7601.17514 | Scheduler Service Client DLL
|
| | scksp.dll | 6.1.7601.23403 | Microsoft Smart Card Key Storage Provider
|
| | scp32.dll | 2.0.330.0 | Code Page Translation Library
|
| | scripto.dll | 6.6.7600.16385 | Microsoft ScriptO
|
| | scrobj.dll | 5.8.7601.23403 | Windows ® Script Component Runtime
|
| | scrptadm.dll | 6.1.7601.23403 | Script Adm Extension
|
| | scrrun.dll | 5.8.7601.23403 | Microsoft ® Script Runtime
|
| | sdiageng.dll | 6.1.7600.16385 | Scripted Diagnostics Execution Engine
|
| | sdiagprv.dll | 6.1.7600.16385 | Windows Scripted Diagnostic Provider API
|
| | sdohlp.dll | 6.1.7600.16385 | NPS SDO Helper Component
|
| | searchfolder.dll | 6.1.7601.23403 | SearchFolder
|
| | sechost.dll | 6.1.7601.23403 | Host for SCM/SDDL/LSA Lookup APIs
|
| | secproc.dll | 6.1.7601.23403 | Windows Rights Management Desktop Security Processor
|
| | secproc_isv.dll | 6.1.7601.23403 | Windows Rights Management Desktop Security Processor
|
| | secproc_ssp.dll | 6.1.7601.23403 | Windows Rights Management Services Server Security Processor
|
| | secproc_ssp_isv.dll | 6.1.7601.23403 | Windows Rights Management Services Server Security Processor (Pre-production)
|
| | secur32.dll | 6.1.7601.23915 | Security Support Provider Interface
|
| | security.dll | 6.1.7600.16385 | Security Support Provider Interface
|
| | sendmail.dll | 6.1.7600.16385 | Send Mail
|
| | sens.dll | 6.1.7600.16385 | System Event Notification Service (SENS)
|
| | sensapi.dll | 6.1.7600.16385 | SENS Connectivity API DLL
|
| | sensorsapi.dll | 6.1.7600.16385 | Sensor API
|
| | sensorscpl.dll | 6.1.7601.17514 | Open Location and Other Sensors
|
| | serialui.dll | 6.1.7600.16385 | Serial Port Property Pages
|
| | serwvdrv.dll | 6.1.7600.16385 | Unimodem Serial Wave driver
|
| | sessenv.dll | 6.1.7601.23403 | Remote Desktop Configuration service
|
| | setupapi.dll | 6.1.7601.23403 | Windows Setup API
|
| | setupcln.dll | 6.1.7601.17514 | Setup Files Cleanup
|
| | sfc.dll | 6.1.7600.16385 | Windows File Protection
|
| | sfc_os.dll | 6.1.7600.16385 | Windows File Protection
|
| | shacct.dll | 6.1.7601.17514 | Shell Accounts Classes
|
| | shdocvw.dll | 6.1.7601.23896 | Shell Doc Object and Control Library
|
| | shell32.dll | 6.1.7601.23893 | Windows Shell Common Dll
|
| | shellstyle.dll | 6.1.7600.16385 | Windows Shell Style Resource Dll
|
| | shfolder.dll | 6.1.7600.16385 | Shell Folder Service
|
| | shgina.dll | 6.1.7601.17514 | Windows Shell User Logon
|
| | shimeng.dll | 6.1.7601.23403 | Shim Engine DLL
|
| | shimgvw.dll | 6.1.7601.17514 | Photo Gallery Viewer
|
| | shlwapi.dll | 6.1.7601.23403 | Shell Light-weight Utility Library
|
| | shpafact.dll | 6.1.7600.16385 | Windows Shell LUA/PA Elevation Factory Dll
|
| | shsetup.dll | 6.1.7601.17514 | Shell setup helper
|
| | shsvcs.dll | 6.1.7601.23403 | Windows Shell Services Dll
|
| | shunimpl.dll | 6.1.7601.17514 | Windows Shell Obsolete APIs
|
| | shwebsvc.dll | 6.1.7601.17514 | Windows Shell Web Services
|
| | signdrv.dll | 6.1.7600.16385 | WMI provider for Signed Drivers
|
| | sisbkup.dll | 6.1.7601.23403 | Single-Instance Store Backup Support Functions
|
| | slc.dll | 6.1.7600.16385 | Software Licensing Client Dll
|
| | slcext.dll | 6.1.7600.16385 | Software Licensing Client Extension Dll
|
| | slwga.dll | 6.1.7601.17514 | Software Licensing WGA API
|
| | smartcardcredentialprovider.dll | 6.1.7601.23403 | Windows Smartcard Credential Provider
|
| | smbhelperclass.dll | 1.0.0.1 | SMB (File Sharing) Helper Class for Network Diagnostic Framework
|
| | sndvolsso.dll | 6.1.7601.17514 | SCA Volume
|
| | snmpapi.dll | 6.1.7600.16385 | SNMP Utility Library
|
| | softkbd.dll | 6.1.7600.16385 | Soft Keyboard Server and Tip
|
| | softpub.dll | 6.1.7600.16385 | Softpub Forwarder DLL
|
| | sortserver2003compat.dll | 6.1.7600.16385 | Sort Version Server 2003
|
| | sortwindows6compat.dll | 6.1.7600.16385 | Sort Version Windows 6.0
|
| | spbcd.dll | 6.1.7601.17514 | BCD Sysprep Plugin
|
| | spfileq.dll | 6.1.7600.16385 | Windows SPFILEQ
|
| | spinf.dll | 6.1.7600.16385 | Windows SPINF
|
| | spnet.dll | 6.1.7600.16385 | Net Sysprep Plugin
|
| | spopk.dll | 6.1.7601.17514 | OPK Sysprep Plugin
|
| | spp.dll | 6.1.7601.23403 | Microsoft® Windows Shared Protection Point Library
|
| | sppc.dll | 6.1.7601.17514 | Software Licensing Client Dll
|
| | sppcc.dll | 6.1.7600.16385 | Software Licensing Commerce Client
|
| | sppcext.dll | 6.1.7600.16385 | Software Protection Platform Client Extension Dll
|
| | sppcomapi.dll | 6.1.7601.17514 | Software Licensing Library
|
| | sppcommdlg.dll | 6.1.7600.16385 | Software Licensing UI API
|
| | sppinst.dll | 6.1.7601.17514 | SPP CMI Installer Plug-in DLL
|
| | sppwmi.dll | 6.1.7600.16385 | Software Protection Platform WMI provider
|
| | spwinsat.dll | 6.1.7600.16385 | WinSAT Sysprep Plugin
|
| | spwizeng.dll | 6.1.7601.17514 | Setup Wizard Framework
|
| | spwizimg.dll | 6.1.7600.16385 | Setup Wizard Framework Resources
|
| | spwizres.dll | 6.1.7601.17514 | Setup Wizard Framework Resources
|
| | spwmp.dll | 6.1.7601.23930 | Windows Media Player System Preparation DLL
|
| | sqlceoledb30.dll | 3.0.7600.0 | Microsoft SQL Mobile
|
| | sqlceqp30.dll | 3.0.7600.0 | Microsoft SQL Mobile
|
| | sqlcese30.dll | 3.0.7601.0 | Microsoft SQL Mobile
|
| | sqloledb.dll | 6.1.7601.17514 | OLE DB Provider for SQL Server
|
| | sqlsrv32.dll | 6.1.7601.17514 | SQL Server ODBC Driver
|
| | sqlunirl.dll | 2000.80.728.0 | String Function .DLL for SQL Enterprise Components
|
| | sqlwid.dll | 1999.10.20.0 | Unicode Function .DLL for SQL Enterprise Components
|
| | sqlwoa.dll | 1999.10.20.0 | Unicode/ANSI Function .DLL for SQL Enterprise Components
|
| | sqlxmlx.dll | 6.1.7600.16385 | XML extensions for SQL Server
|
| | sqmapi.dll | 6.1.7601.17514 | SQM Client
|
| | srchadmin.dll | 7.0.7601.17514 | Indexing Options
|
| | srclient.dll | 6.1.7601.23915 | Microsoft® Windows System Restore Client Library
|
| | srhelper.dll | 6.1.7600.16385 | Microsoft® Windows driver and windows update enumeration library
|
| | srpuxnativesnapin.dll | 6.1.7600.16385 | Application Control Policies Group Policy Editor Extension
|
| | srvcli.dll | 6.1.7601.17514 | Server Service Client DLL
|
| | sscore.dll | 6.1.7601.23403 | Server Service Core DLL
|
| | ssdevm.dll | 1.5.5.0 | Device Monitor
|
| | ssdpapi.dll | 6.1.7600.16385 | SSDP Client API DLL
|
| | sspicli.dll | 6.1.7601.23915 | Security Support Provider Interface
|
| | ssshim.dll | 6.1.7600.16385 | Windows Componentization Platform Servicing API
|
| | ssusbpn.dll | 0.6.0.0 | USB Device
|
| | stclient.dll | 2001.12.8530.16385 | COM+ Configuration Catalog Client
|
| | sti.dll | 6.1.7601.23403 | Still Image Devices client DLL
|
| | stobject.dll | 6.1.7601.23403 | Systray shell service object
|
| | storage.dll | 2.10.35.35 | OLE 2.1 16/32 Interoperability Library
|
| | storagecontexthandler.dll | 6.1.7600.16385 | Device Center Storage Context Menu Handler
|
| | storprop.dll | 6.1.7600.16385 | Property Pages for Storage Devices
|
| | structuredquery.dll | 7.0.7601.23451 | Structured Query
|
| | sud.dll | 6.1.7601.17514 | SUD Control Panel
|
| | sxproxy.dll | 6.1.7601.23403 | Microsoft® Windows System Protection Proxy Library
|
| | sxs.dll | 6.1.7601.23403 | Fusion 2.5
|
| | sxshared.dll | 6.1.7600.16385 | Microsoft® Windows SX Shared Library
|
| | sxsstore.dll | 6.1.7600.16385 | Sxs Store DLL
|
| | synccenter.dll | 6.1.7601.17514 | Microsoft Sync Center
|
| | synceng.dll | 6.1.7601.23403 | Windows Briefcase Engine
|
| | synchostps.dll | 6.1.7600.16385 | Proxystub for sync host
|
| | syncinfrastructure.dll | 6.1.7600.16385 | Microsoft Windows Sync Infrastructure.
|
| | syncinfrastructureps.dll | 6.1.7600.16385 | Microsoft Windows sync infrastructure proxy stub.
|
| | syncom.dll | 18.0.5.0 | SynCOM
|
| | syncreg.dll | 2007.94.7600.16385 | Microsoft Synchronization Framework Registration
|
| | syncui.dll | 6.1.7601.17514 | Windows Briefcase
|
| | syssetup.dll | 6.1.7601.17514 | Windows NT System Setup
|
| | systemcpl.dll | 6.1.7601.17514 | My System CPL
|
| | t2embed.dll | 6.1.7601.23930 | Microsoft T2Embed Font Embedding
|
| | tapi3.dll | 6.1.7600.16385 | Microsoft TAPI3
|
| | tapi32.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony API Client DLL
|
| | tapimigplugin.dll | 6.1.7600.16385 | Microsoft® Windows(TM) TAPI Migration Plugin Dll
|
| | tapiperf.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony Performance Monitor
|
| | tapisrv.dll | 6.1.7601.23403 | Microsoft® Windows(TM) Telephony Server
|
| | tapisysprep.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony Sysprep Work
|
| | tapiui.dll | 6.1.7600.16385 | Microsoft® Windows(TM) Telephony API UI DLL
|
| | taskcomp.dll | 6.1.7601.23403 | Task Scheduler Backward Compatibility Plug-in
|
| | taskschd.dll | 6.1.7601.23403 | Task Scheduler COM API
|
| | taskschdps.dll | 6.1.7600.16385 | Task Scheduler Interfaces Proxy
|
| | tbs.dll | 6.1.7601.23403 | TBS
|
| | tcpipcfg.dll | 6.1.7601.23403 | Network Configuration Objects
|
| | tcpmib.dll | 6.1.7601.23403 | Standard TCP/IP Port Monitor Helper DLL
|
| | tcpmonui.dll | 6.1.7601.23403 | Standard TCP/IP Port Monitor UI DLL
|
| | tdh.dll | 6.1.7601.23403 | Event Trace Helper Library
|
| | termmgr.dll | 6.1.7601.17514 | Microsoft TAPI3 Terminal Manager
|
| | thawbrkr.dll | 6.1.7600.16385 | Thai Word Breaker
|
| | themecpl.dll | 6.1.7601.17514 | Personalization CPL
|
| | themeui.dll | 6.1.7601.23913 | Windows Theme API
|
| | thumbcache.dll | 6.1.7601.17514 | Microsoft Thumbnail Cache
|
| | timedatemuicallback.dll | 6.1.7600.16385 | Time Date Control UI Language Change plugin
|
| | tlscsp.dll | 6.1.7601.17514 | Microsoft® Remote Desktop Services Cryptographic Utility
|
| | tpmcompc.dll | 6.1.7601.23403 | Computer Chooser Dialog
|
| | tquery.dll | 7.0.7601.23930 | tquery.dll
|
| | traffic.dll | 6.1.7600.16385 | Microsoft Traffic Control 1.0 DLL
|
| | trapi.dll | 6.1.7601.17514 | Microsoft Narrator Text Renderer
|
| | tsbyuv.dll | 6.1.7601.17514 | Toshiba Video Codec
|
| | tschannel.dll | 6.1.7600.16385 | Task Scheduler Proxy
|
| | tsgqec.dll | 6.3.9600.16415 | RD Gateway QEC
|
| | tsmf.dll | 6.1.7601.23403 | RDP MF Plugin
|
| | tspkg.dll | 6.1.7601.23915 | Web Service Security Package
|
| | tsworkspace.dll | 6.1.7601.23403 | RemoteApp and Desktop Connection Component
|
| | tvratings.dll | 6.6.7601.23403 | Module for managing TV ratings
|
| | twext.dll | 6.1.7601.23403 | Previous Versions property page
|
| | txflog.dll | 2001.12.8530.16385 | COM+
|
| | txfw32.dll | 6.1.7600.16385 | TxF Win32 DLL
|
| | typelib.dll | 2.10.3029.1 | OLE 2.1 16/32 Interoperability Library
|
| | tzres.dll | 6.1.7601.23949 | Time Zones resource DLL
|
| | ubpm.dll | 6.1.7601.23403 | Unified Background Process Manager DLL
|
| | ucmhc.dll | 6.1.7600.16385 | UCM Helper Class
|
| | ucrtbase.dll | 10.0.10586.1171 | Microsoft® C Runtime Library
|
| | udhisapi.dll | 6.1.7600.16385 | UPnP Device Host ISAPI Extension
|
| | uexfat.dll | 6.1.7601.23403 | eXfat Utility DLL
|
| | ufat.dll | 6.1.7600.16385 | FAT Utility DLL
|
| | uianimation.dll | 6.2.9200.22005 | Windows Animation Manager
|
| | uiautomationcore.dll | 7.0.0.0 | Microsoft UI Automation Core
|
| | uicom.dll | 6.1.7600.16385 | Add/Remove Modems
|
| | uiribbon.dll | 6.1.7601.17514 | Windows Ribbon Framework
|
| | uiribbonres.dll | 6.1.7601.17514 | Windows Ribbon Framework Resources
|
| | ulib.dll | 6.1.7601.23403 | File Utilities Support DLL
|
| | umdmxfrm.dll | 6.1.7600.16385 | Unimodem Tranform Module
|
| | unimdmat.dll | 6.1.7601.17514 | Unimodem Service Provider AT Mini Driver
|
| | uniplat.dll | 6.1.7600.16385 | Unimodem AT Mini Driver Platform Driver for Windows NT
|
| | untfs.dll | 6.1.7601.23403 | NTFS Utility DLL
|
| | upnp.dll | 6.1.7601.17514 | UPnP Control Point API
|
| | upnphost.dll | 6.1.7600.16385 | UPnP Device Host
|
| | ureg.dll | 6.1.7600.16385 | Registry Utility DLL
|
| | url.dll | 11.0.9600.16428 | Internet Shortcut Shell Extension DLL
|
| | urlmon.dll | 11.0.9600.18858 | OLE32 Extensions for Win32
|
| | usbceip.dll | 6.1.7600.16385 | USBCEIP Task
|
| | usbperf.dll | 6.1.7600.16385 | USB Performance Objects DLL
|
| | usbui.dll | 6.1.7600.16385 | USB UI Dll
|
| | user32.dll | 6.1.7601.23594 | Multi-User Windows USER API Client DLL
|
| | useraccountcontrolsettings.dll | 6.1.7601.17514 | UserAccountControlSettings
|
| | usercpl.dll | 6.1.7601.17514 | User control panel
|
| | userenv.dll | 6.1.7601.23403 | Userenv
|
| | usp10.dll | 1.626.7601.23894 | Uniscribe Unicode script processor
|
| | utildll.dll | 6.1.7601.17514 | WinStation utility support DLL
|
| | uudf.dll | 6.1.7600.16385 | UDF Utility DLL
|
| | uxinit.dll | 6.1.7600.16385 | Windows User Experience Session Initialization Dll
|
| | uxlib.dll | 6.1.7601.17514 | Setup Wizard Framework
|
| | uxlibres.dll | 6.1.7600.16385 | UXLib Resources
|
| | uxtheme.dll | 6.1.7601.23403 | Microsoft UxTheme Library
|
| | van.dll | 6.1.7601.17514 | View Available Networks
|
| | vault.dll | 6.1.7601.17514 | Windows vault Control Panel
|
| | vaultcli.dll | 6.1.7600.16385 | Credential Vault Client Library
|
| | vbajet32.dll | 6.0.1.9431 | Visual Basic for Applications Development Environment - Expression Service Loader
|
| | vbame.dll | 2.0.2.5 | VBA : Middle East Support
|
| | vbar332.dll | 3.0.0.6908 | Visual Basic for Applications Runtime - Expression Service
|
| | vbscript.dll | 5.8.9600.18860 | Microsoft ® VBScript
|
| | vcamp110.dll | 11.0.51106.1 | Microsoft® C++ AMP Runtime
|
| | vcamp120.dll | 12.0.40664.0 | Microsoft® C++ AMP Runtime
|
| | vcamp140.dll | 14.13.26020.0 | Microsoft® C++ AMP Runtime
|
| | vccorlib110.dll | 11.0.51106.1 | Microsoft ® VC WinRT core library
|
| | vccorlib120.dll | 12.0.40664.0 | Microsoft ® VC WinRT core library
|
| | vccorlib140.dll | 14.13.26020.0 | Microsoft ® VC WinRT core library
|
| | vcomp100.dll | 10.0.40219.473 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp110.dll | 11.0.51106.1 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp120.dll | 12.0.40664.0 | Microsoft® C/C++ OpenMP Runtime
|
| | vcomp140.dll | 14.13.26020.0 | Microsoft® C/C++ OpenMP Runtime
|
| | vcruntime140.dll | 14.13.26020.0 | Microsoft® C Runtime Library
|
| | vdmdbg.dll | 6.1.7600.16385 | VDMDBG.DLL
|
| | vds_ps.dll | 6.1.7601.23403 | Microsoft® Virtual Disk Service proxy/stub
|
| | vdsbas.dll | 6.1.7601.17514 | Virtual Disk Service Basic Provider
|
| | vdsdyn.dll | 6.1.7600.16385 | VDS Dynamic Volume Provider, Version 2.1.0.1
|
| | vdsvd.dll | 6.1.7600.16385 | VDS Virtual Disk Provider, Version 1.0
|
| | verifier.dll | 6.1.7600.16385 | Standard application verifier provider dll
|
| | version.dll | 6.1.7601.23403 | Version Checking and File Installation Libraries
|
| | vfpodbc.dll | 1.0.2.0 | vfpodbc
|
| | vfwwdm32.dll | 6.1.7601.17514 | VfW MM Driver for WDM Video Capture Devices
|
| | vidreszr.dll | 6.1.7601.23403 | Windows Media Resizer
|
| | virtdisk.dll | 6.1.7600.16385 | Virtual Disk API DLL
|
| | vmapo232.dll | 1.2.16.73 | Creative Audio Processing Object Module
|
| | vmapo32.dll | 1.0.54.0 | Creative Audio Processing Object Module
|
| | vmthx32.dll | 1.0.15.150 | Creative Audio Processing Object Module
|
| | vpnikeapi.dll | 6.1.7601.17514 | VPN IKE API's
|
| | vss_ps.dll | 6.1.7600.16385 | Microsoft® Volume Shadow Copy Service proxy/stub
|
| | vssapi.dll | 6.1.7601.23403 | Microsoft® Volume Shadow Copy Requestor/Writer Services API DLL
|
| | vsstrace.dll | 6.1.7601.23403 | Microsoft® Volume Shadow Copy Service Tracing Library
|
| | w32topl.dll | 6.1.7600.16385 | Windows NT Topology Maintenance Tool
|
| | wab32.dll | 6.1.7601.23403 | Microsoft (R) Contacts DLL
|
| | wab32res.dll | 6.1.7601.23403 | Microsoft (R) Contacts DLL
|
| | wabsyncprovider.dll | 6.1.7600.16385 | Microsoft Windows Contacts Sync Provider
|
| | wamregps.dll | 7.5.7601.23403 | WAMREG Proxy Stub
|
| | wavemsp.dll | 6.1.7601.17514 | Microsoft Wave MSP
|
| | wbemcomn.dll | 6.1.7601.17514 | WMI
|
| | wcnapi.dll | 6.1.7600.16385 | Windows Connect Now - API Helper DLL
|
| | wcncsvc.dll | 6.1.7601.17514 | Windows Connect Now - Config Registrar Service
|
| | wcneapauthproxy.dll | 6.1.7600.16385 | Windows Connect Now - WCN EAP Authenticator Proxy
|
| | wcneappeerproxy.dll | 6.1.7600.16385 | Windows Connect Now - WCN EAP PEER Proxy
|
| | wcnwiz.dll | 6.1.7600.16385 | Windows Connect Now Wizards
|
| | wcspluginservice.dll | 6.1.7601.23677 | WcsPlugInService DLL
|
| | wdc.dll | 6.1.7601.23841 | Performance Monitor
|
| | wdi.dll | 6.1.7601.23403 | Windows Diagnostic Infrastructure
|
| | wdigest.dll | 6.1.7601.23915 | Microsoft Digest Access
|
| | wdscore.dll | 6.1.7601.17514 | Panther Engine Module
|
| | webcheck.dll | 11.0.9600.18858 | Web Site Monitor
|
| | webclnt.dll | 6.1.7601.23542 | Web DAV Service DLL
|
| | webio.dll | 6.1.7601.23403 | Web Transfer Protocols API
|
| | webservices.dll | 6.1.7601.23403 | Windows Web Services Runtime
|
| | wecapi.dll | 6.1.7601.23403 | Event Collector Configuration API
|
| | wer.dll | 6.1.7601.23877 | Windows Error Reporting DLL
|
| | werdiagcontroller.dll | 6.1.7601.23877 | WER Diagnostic Controller
|
| | werui.dll | 6.1.7600.16385 | Windows Error Reporting UI DLL
|
| | wevtapi.dll | 6.1.7600.16385 | Eventing Consumption and Configuration API
|
| | wevtfwd.dll | 6.1.7600.16385 | WS-Management Event Forwarding Plug-in
|
| | wfapigp.dll | 6.1.7601.23403 | Windows Firewall GPO Helper dll
|
| | wfhc.dll | 6.1.7600.16385 | Windows Firewall Helper Class
|
| | whealogr.dll | 6.1.7600.16385 | WHEA Troubleshooter
|
| | whhelper.dll | 6.1.7600.16385 | Net shell helper DLL for winHttp
|
| | wiaaut.dll | 6.1.7601.23403 | WIA Automation Layer
|
| | wiadefui.dll | 6.1.7601.17514 | WIA Scanner Default UI
|
| | wiadss.dll | 6.1.7600.16385 | WIA TWAIN compatibility layer
|
| | wiaextensionhost64.dll | 6.1.7600.16385 | WIA Extension Host for thunking APIs from 32-bit to 64-bit process
|
| | wiascanprofiles.dll | 6.1.7600.16385 | Microsoft Windows ScanProfiles
|
| | wiashext.dll | 6.1.7600.16385 | Imaging Devices Shell Folder UI
|
| | wiatrace.dll | 6.1.7601.23403 | WIA Tracing
|
| | wiavideo.dll | 6.1.7601.17514 | WIA Video
|
| | wimgapi.dll | 6.1.7601.17514 | Windows Imaging Library
|
| | win32spl.dll | 6.1.7601.23889 | Client Side Rendering Print Provider
|
| | winbio.dll | 6.1.7600.16385 | Windows Biometrics Client API
|
| | winbrand.dll | 6.1.7600.16385 | Windows Branding Resources
|
| | wincredprovider.dll | 6.1.7601.23403 | wincredprovider DLL
|
| | windowscodecs.dll | 6.2.9200.21830 | Microsoft Windows Codecs Library
|
| | windowscodecsext.dll | 6.2.9200.16492 | Microsoft Windows Codecs Extended Library
|
| | winfax.dll | 6.1.7601.23403 | Microsoft Fax API Support DLL
|
| | winhttp.dll | 6.1.7601.23451 | Windows HTTP Services
|
| | wininet.dll | 11.0.9600.18858 | Internet Extensions for Win32
|
| | winipsec.dll | 6.1.7601.23452 | Windows IPsec SPD Client DLL
|
| | winmm.dll | 6.1.7601.23403 | MCI API DLL
|
| | winnsi.dll | 6.1.7601.23889 | Network Store Information RPC interface
|
| | winrnr.dll | 6.1.7600.16385 | LDAP RnR Provider DLL
|
| | winrscmd.dll | 6.1.7600.16385 | remtsvc
|
| | winrsmgr.dll | 6.1.7600.16385 | WSMan Shell API
|
| | winrssrv.dll | 6.1.7600.16385 | winrssrv
|
| | winsatapi.dll | 6.1.7601.23403 | Windows System Assessment Tool API
|
| | winscard.dll | 6.1.7601.23403 | Microsoft Smart Card API
|
| | winshfhc.dll | 6.1.7600.16385 | File Risk Estimation
|
| | winsockhc.dll | 6.1.7600.16385 | Winsock Network Diagnostic Helper Class
|
| | winsrpc.dll | 6.1.7600.16385 | WINS RPC LIBRARY
|
| | winsta.dll | 6.1.7601.23403 | Winstation Library
|
| | winsync.dll | 2007.94.7600.16385 | Synchronization Framework
|
| | winsyncmetastore.dll | 2007.94.7600.16385 | Windows Synchronization Metadata Store
|
| | winsyncproviders.dll | 2007.94.7600.16385 | Windows Synchronization Provider Framework
|
| | wintrust.dll | 6.1.7601.23769 | Microsoft Trust Verification APIs
|
| | winusb.dll | 6.1.7600.16385 | Windows USB Driver User Library
|
| | wkscli.dll | 6.1.7601.17514 | Workstation Service Client DLL
|
| | wksprtps.dll | 6.3.9600.16415 | WorkspaceRuntime ProxyStub DLL
|
| | wlanapi.dll | 6.1.7601.23915 | Windows WLAN AutoConfig Client Side API DLL
|
| | wlancfg.dll | 6.1.7600.16385 | Wlan Netsh Helper DLL
|
| | wlanconn.dll | 6.1.7600.16385 | Dot11 Connection Flows
|
| | wlandlg.dll | 6.1.7600.16385 | Wireless Lan Dialog Wizards
|
| | wlangpui.dll | 6.1.7601.23403 | Wireless Network Policy Management Snap-in
|
| | wlanhlp.dll | 6.1.7601.23915 | Windows Wireless LAN 802.11 Client Side Helper API
|
| | wlaninst.dll | 6.1.7601.23403 | Windows NET Device Class Co-Installer for Wireless LAN
|
| | wlanmm.dll | 6.1.7600.16385 | Dot11 Media and AdHoc Managers
|
| | wlanmsm.dll | 6.1.7601.23915 | Windows Wireless LAN 802.11 MSM DLL
|
| | wlanpref.dll | 6.1.7601.17514 | Wireless Preferred Networks
|
| | wlansec.dll | 6.1.7601.23915 | Windows Wireless LAN 802.11 MSM Security Module DLL
|
| | wlanui.dll | 6.1.7601.17514 | Wireless Profile UI
|
| | wlanutil.dll | 6.1.7600.16385 | Windows Wireless LAN 802.11 Utility DLL
|
| | wldap32.dll | 6.1.7601.23889 | Win32 LDAP API DLL
|
| | wlgpclnt.dll | 6.1.7600.16385 | 802.11 Group Policy Client
|
| | wls0wndh.dll | 6.1.7600.16385 | Session0 Viewer Window Hook DLL
|
| | wmadmod.dll | 6.1.7601.23403 | Windows Media Audio Decoder
|
| | wmadmoe.dll | 6.1.7601.23403 | Windows Media Audio 10 Encoder/Transcoder
|
| | wmasf.dll | 12.0.7600.16385 | Windows Media ASF DLL
|
| | wmcodecdspps.dll | 6.1.7600.16385 | Windows Media CodecDSP Proxy Stub Dll
|
| | wmdmlog.dll | 12.0.7600.16385 | Windows Media Device Manager Logger
|
| | wmdmps.dll | 12.0.7600.16385 | Windows Media Device Manager Proxy Stub
|
| | wmdrmdev.dll | 12.0.7601.17514 | Windows Media DRM for Network Devices Registration DLL
|
| | wmdrmnet.dll | 12.0.7601.17514 | Windows Media DRM for Network Devices DLL
|
| | wmdrmsdk.dll | 11.0.7601.23471 | Windows Media DRM SDK DLL
|
| | wmerror.dll | 12.0.7600.16385 | Windows Media Error Definitions (English)
|
| | wmi.dll | 6.1.7601.23403 | WMI DC and DP functionality
|
| | wmidx.dll | 12.0.7600.16385 | Windows Media Indexer DLL
|
| | wmiprop.dll | 6.1.7600.16385 | WDM Provider Dynamic Property Page CoInstaller
|
| | wmnetmgr.dll | 12.0.7601.17514 | Windows Media Network Plugin Manager DLL
|
| | wmp.dll | 12.0.7601.23930 | Windows Media Player
|
| | wmpcm.dll | 12.0.7600.16385 | Windows Media Player Compositing Mixer
|
| | wmpdui.dll | 12.0.7600.16385 | Windows DirectUser Engine
|
| | wmpdxm.dll | 12.0.7601.17514 | Windows Media Player Extension
|
| | wmpeffects.dll | 12.0.7601.23403 | Windows Media Player Effects
|
| | wmpencen.dll | 12.0.7601.17514 | Windows Media Player Encoding Module
|
| | wmphoto.dll | 6.2.9200.21371 | Windows Media Photo Codec
|
| | wmploc.dll | 12.0.7601.23930 | Windows Media Player Resources
|
| | wmpmde.dll | 12.0.7601.23403 | WMPMDE DLL
|
| | wmpps.dll | 12.0.7601.17514 | Windows Media Player Proxy Stub Dll
|
| | wmpshell.dll | 12.0.7601.17514 | Windows Media Player Launcher
|
| | wmpsrcwp.dll | 12.0.7601.17514 | WMPSrcWp Module
|
| | wmsgapi.dll | 6.1.7600.16385 | WinLogon IPC Client
|
| | wmspdmod.dll | 6.1.7601.23403 | Windows Media Audio Voice Decoder
|
| | wmspdmoe.dll | 6.1.7601.23403 | Windows Media Audio Voice Encoder
|
| | wmvcore.dll | 12.0.7601.17514 | Windows Media Playback/Authoring DLL
|
| | wmvdecod.dll | 6.1.7601.23403 | Windows Media Video Decoder
|
| | wmvdspa.dll | 6.1.7600.16385 | Windows Media Video DSP Components - Advanced
|
| | wmvencod.dll | 6.1.7601.23403 | Windows Media Video 9 Encoder
|
| | wmvsdecd.dll | 6.1.7601.23403 | Windows Media Screen Decoder
|
| | wmvsencd.dll | 6.1.7601.23403 | Windows Media Screen Encoder
|
| | wmvxencd.dll | 6.1.7601.23403 | Windows Media Video Encoder
|
| | wow32.dll | 6.1.7601.23915 | Wow32
|
| | wpc.dll | 1.0.0.1 | WPC Settings Library
|
| | wpcao.dll | 6.1.7600.16385 | WPC Administrator Override
|
| | wpcsvc.dll | 1.0.0.1 | WPC Filtering Service
|
| | wpdshext.dll | 6.1.7601.23403 | Portable Devices Shell Extension
|
| | wpdshserviceobj.dll | 6.1.7601.23403 | Windows Portable Device Shell Service Object
|
| | wpdsp.dll | 6.1.7601.17514 | WMDM Service Provider for Windows Portable Devices
|
| | wpdwcn.dll | 6.1.7601.17514 | Windows Portable Device WCN Wizard
|
| | ws2_32.dll | 6.1.7601.23451 | Windows Socket 2.0 32-Bit DLL
|
| | ws2help.dll | 6.1.7600.16385 | Windows Socket 2.0 Helper for Windows NT
|
| | wscapi.dll | 6.1.7601.17514 | Windows Security Center API
|
| | wscinterop.dll | 6.1.7600.16385 | Windows Health Center WSC Interop
|
| | wscisvif.dll | 6.1.7600.16385 | Windows Security Center ISV API
|
| | wscmisetup.dll | 6.1.7600.16385 | Installers for Winsock Transport and Name Space Providers
|
| | wscproxystub.dll | 6.1.7600.16385 | Windows Security Center ISV Proxy Stub
|
| | wsdapi.dll | 6.1.7601.23403 | Web Services for Devices API DLL
|
| | wsdchngr.dll | 6.1.7601.17514 | WSD Challenge Component
|
| | wsecedit.dll | 6.1.7601.23403 | Security Configuration UI Module
|
| | wshbth.dll | 6.1.7601.17514 | Windows Sockets Helper DLL
|
| | wshcon.dll | 5.8.7601.23403 | Microsoft ® Windows Script Controller
|
| | wshelper.dll | 6.1.7600.16385 | Winsock Net shell helper DLL for winsock
|
| | wshext.dll | 5.8.7600.16385 | Microsoft ® Shell Extension for Windows Script Host
|
| | wship6.dll | 6.1.7600.16385 | Winsock2 Helper DLL (TL/IPv6)
|
| | wshirda.dll | 6.1.7601.17514 | Windows Sockets Helper DLL
|
| | wshqos.dll | 6.1.7600.16385 | QoS Winsock2 Helper DLL
|
| | wshrm.dll | 6.1.7601.23403 | Windows Sockets Helper DLL for PGM
|
| | wshtcpip.dll | 6.1.7600.16385 | Winsock2 Helper DLL (TL/IPv4)
|
| | wsmanmigrationplugin.dll | 6.1.7601.23512 | WinRM Migration Plugin
|
| | wsmauto.dll | 6.1.7601.23512 | WSMAN Automation
|
| | wsmplpxy.dll | 6.1.7601.23512 | wsmplpxy
|
| | wsmres.dll | 6.1.7601.23512 | WSMan Resource DLL
|
| | wsmsvc.dll | 6.1.7601.23512 | WSMan Service
|
| | wsmwmipl.dll | 6.1.7601.23512 | WSMAN WMI Provider
|
| | wsnmp32.dll | 6.1.7601.17514 | Microsoft WinSNMP v2.0 Manager API
|
| | wsock32.dll | 6.1.7600.16385 | Windows Socket 32-Bit DLL
|
| | wtsapi32.dll | 6.1.7601.17514 | Windows Remote Desktop Session Host Server SDK APIs
|
| | wuapi.dll | 7.6.7601.23806 | Windows Update Client API
|
| | wudriver.dll | 7.6.7601.23806 | Windows Update WUDriver Stub
|
| | wups.dll | 7.6.7601.23806 | Windows Update client proxy stub
|
| | wuwebv.dll | 7.6.7601.23806 | Windows Update Vista Web Control
|
| | wvc.dll | 6.1.7601.23841 | Windows Visual Components
|
| | wwanapi.dll | 6.1.7600.16385 | Mbnapi
|
| | wwapi.dll | 8.1.2.0 | WWAN API
|
| | wzcdlg.dll | 6.1.7600.16385 | Windows Connect Now - Flash Config Enrollee
|
| | x3daudio1_0.dll | 9.11.519.0 | X3DAudio
|
| | x3daudio1_1.dll | 9.15.779.0 | X3DAudio
|
| | x3daudio1_2.dll | 9.21.1148.0 | X3DAudio
|
| | x3daudio1_3.dll | 9.22.1284.0 | X3DAudio
|
| | x3daudio1_4.dll | 9.23.1350.0 | X3DAudio
|
| | x3daudio1_5.dll | 9.25.1476.0 | X3DAudio
|
| | x3daudio1_6.dll | 9.26.1590.0 | 3D Audio Library
|
| | x3daudio1_7.dll | 9.28.1886.0 | 3D Audio Library
|
| | xactengine2_0.dll | 9.11.519.0 | XACT Engine API
|
| | xactengine2_1.dll | 9.12.589.0 | XACT Engine API
|
| | xactengine2_10.dll | 9.21.1148.0 | XACT Engine API
|
| | xactengine2_2.dll | 9.13.644.0 | XACT Engine API
|
| | xactengine2_3.dll | 9.14.701.0 | XACT Engine API
|
| | xactengine2_4.dll | 9.15.779.0 | XACT Engine API
|
| | xactengine2_5.dll | 9.16.857.0 | XACT Engine API
|
| | xactengine2_6.dll | 9.17.892.0 | XACT Engine API
|
| | xactengine2_7.dll | 9.18.944.0 | XACT Engine API
|
| | xactengine2_8.dll | 9.19.1007.0 | XACT Engine API
|
| | xactengine2_9.dll | 9.20.1057.0 | XACT Engine API
|
| | xactengine3_0.dll | 9.22.1284.0 | XACT Engine API
|
| | xactengine3_1.dll | 9.23.1350.0 | XACT Engine API
|
| | xactengine3_2.dll | 9.24.1400.0 | XACT Engine API
|
| | xactengine3_3.dll | 9.25.1476.0 | XACT Engine API
|
| | xactengine3_4.dll | 9.26.1590.0 | XACT Engine API
|
| | xactengine3_5.dll | 9.27.1734.0 | XACT Engine API
|
| | xactengine3_6.dll | 9.28.1886.0 | XACT Engine API
|
| | xactengine3_7.dll | 9.29.1962.0 | XACT Engine API
|
| | xapofx1_0.dll | 9.23.1350.0 | XAPOFX
|
| | xapofx1_1.dll | 9.24.1400.0 | XAPOFX
|
| | xapofx1_2.dll | 9.25.1476.0 | XAPOFX
|
| | xapofx1_3.dll | 9.26.1590.0 | Audio Effect Library
|
| | xapofx1_4.dll | 9.28.1886.0 | Audio Effect Library
|
| | xapofx1_5.dll | 9.29.1962.0 | Audio Effect Library
|
| | xaudio2_0.dll | 9.22.1284.0 | XAudio2 Game Audio API
|
| | xaudio2_1.dll | 9.23.1350.0 | XAudio2 Game Audio API
|
| | xaudio2_2.dll | 9.24.1400.0 | XAudio2 Game Audio API
|
| | xaudio2_3.dll | 9.25.1476.0 | XAudio2 Game Audio API
|
| | xaudio2_4.dll | 9.26.1590.0 | XAudio2 Game Audio API
|
| | xaudio2_5.dll | 9.27.1734.0 | XAudio2 Game Audio API
|
| | xaudio2_6.dll | 9.28.1886.0 | XAudio2 Game Audio API
|
| | xaudio2_7.dll | 9.29.1962.0 | XAudio2 Game Audio API
|
| | xinput1_1.dll | 9.12.589.0 | Microsoft Common Controller API
|
| | xinput1_2.dll | 9.14.701.0 | Microsoft Common Controller API
|
| | xinput1_3.dll | 9.18.944.0 | Microsoft Common Controller API
|
| | xinput9_1_0.dll | 6.1.7600.16385 | XNA Common Controller
|
| | xmlfilter.dll | 2008.0.7600.16385 | XML Filter
|
| | xmllite.dll | 1.3.1001.0 | Microsoft XmlLite Library
|
| | xmlprovi.dll | 6.1.7600.16385 | Network Provisioning Service Client API
|
| | xmlrw.dll | 2011.110.9165.1186 | XMLRW
|
| | xmlrwbin.dll | 2011.110.9165.1186 | XMLRWBIN
|
| | xolehlp.dll | 2001.12.8531.23403 | Microsoft Distributed Transaction Coordinator Helper APIs DLL
|
| | xpsfilt.dll | 6.1.7600.16385 | XML Paper Specification Document IFilter
|
| | xpsgdiconverter.dll | 6.2.9200.20928 | XPS to GDI Converter
|
| | xpsprint.dll | 6.2.9200.16492 | XPS Printing DLL
|
| | xpsrasterservice.dll | 6.1.7601.17514 | XPS Rasterization Service Component
|
| | xpsservices.dll | 6.1.7601.17514 | Xps Object Model in memory creation and deserialization
|
| | xpsshhdr.dll | 6.1.7600.16385 | Package Document Shell Extension Handler
|
| | xpssvcs.dll | 6.1.7600.16385 | Native Code Xps Services Library
|
| | xwizards.dll | 6.1.7600.16385 | Extensible Wizards Manager Module
|
| | xwreg.dll | 6.1.7600.16385 | Extensible Wizard Registration Manager Module
|
| | xwtpdui.dll | 6.1.7600.16385 | Extensible Wizard Type Plugin for DUI
|
| | xwtpw32.dll | 6.1.7600.16385 | Extensible Wizard Type Plugin for Win32
|
| | zipfldr.dll | 6.1.7601.23403 | Compressed (zipped) Folders
|
| | | | |
|
| [ Certificate Authorities / AlphaSSL CA - SHA256 - G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 31 36 F0 4E 44 01 00 00 00 00 04
|
| | | Срок действия | 20.02.2014 - 20.02.2024
|
| | | MD5 Hash | 342E1E02D91852D4A66F8A892167C8FA
|
| | | SHA1 Hash | 4C27431717565A3A07F3E6D0032C4258949CF9EC
|
|
|
| | Свойства эмитента:
|
| | | Имя | GlobalSign Root CA
|
| | | Организация | GlobalSign nv-sa
|
| | | Подразделение | Root CA
|
| | | Страна | Belgium
|
|
|
| | Свойства субъекта:
|
| | | Имя | AlphaSSL CA - SHA256 - G2
|
| | | Организация | GlobalSign nv-sa
|
| | | Страна | Belgium
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / COMODO ECC Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 4E 44 C1 E5 F4 E3 9F 13 1F 90 A8 FA 3F 02 52 43
|
| | | Срок действия | 30.05.2000 - 30.05.2020
|
| | | MD5 Hash | C790A56C69CBAF0BF3F30A40D0A2AECC
|
| | | SHA1 Hash | AE223CBF20191B40D7FFB4EA5701B65FDC68A1CA
|
|
|
| | Свойства эмитента:
|
| | | Имя | AddTrust External CA Root
|
| | | Организация | AddTrust AB
|
| | | Подразделение | AddTrust External TTP Network
|
| | | Страна | Sweden
|
|
|
| | Свойства субъекта:
|
| | | Имя | COMODO ECC Certification Authority
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | 1.2.840.10045.2.1
|
|
|
| [ Certificate Authorities / COMODO RSA Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 22 DE 84 FC A2 70 D7 AB 8E F3 49 EB 56 EE 66 27
|
| | | Срок действия | 30.05.2000 - 30.05.2020
|
| | | MD5 Hash | 1EDAF9AE99CE2920667D0E9A8B3F8C9C
|
| | | SHA1 Hash | F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0
|
|
|
| | Свойства эмитента:
|
| | | Имя | AddTrust External CA Root
|
| | | Организация | AddTrust AB
|
| | | Подразделение | AddTrust External TTP Network
|
| | | Страна | Sweden
|
|
|
| | Свойства субъекта:
|
| | | Имя | COMODO RSA Certification Authority
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / COMODO RSA Domain Validation Secure Server CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 07 8C 7C A3 DB 6E 8A 14 6C 36 75 D9 EA 6E 2E 2B
|
| | | Срок действия | 12.02.2014 - 12.02.2029
|
| | | MD5 Hash | 83E10465B722EF33FF0B6F535E8D996B
|
| | | SHA1 Hash | 339CDD57CFD5B141169B615FF31428782D1DA639
|
|
|
| | Свойства эмитента:
|
| | | Имя | COMODO RSA Certification Authority
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства субъекта:
|
| | | Имя | COMODO RSA Domain Validation Secure Server CA
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / DigiCert SHA2 High Assurance Server CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 9F 15 5D B8 42 2B C0 6D F3 F2 5C DC A4 E7 E1 04
|
| | | Срок действия | 22.10.2013 - 22.10.2028
|
| | | MD5 Hash | AAEE5CF8B0D8596D2E0CBE67421CF7DB
|
| | | SHA1 Hash | A031C46782E6E6C662C2C87C76DA9AA62CCABD8E
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert High Assurance EV Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | DigiCert SHA2 High Assurance Server CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / GeoTrust TLS RSA CA G1 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 79 D1 FF 31 E1 96 72 A5 F9 C6 3F 13 2A 78 07 0D
|
| | | Срок действия | 02.11.2017 - 02.11.2027
|
| | | MD5 Hash | 05EE9C2AC66F75D964AC5F1A3C7DE75D
|
| | | SHA1 Hash | 8B3C5B9B867D4BE46D1CB5A01D45D67DC8E94082
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Global Root G2
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | GeoTrust TLS RSA CA G1
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / GlobalSign Organization Validation CA - SHA256 - G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 47 42 F0 4E 44 01 00 00 00 00 04
|
| | | Срок действия | 20.02.2014 - 20.02.2024
|
| | | MD5 Hash | D3E8706D8292ACE4DDEBF7A8BBBD566B
|
| | | SHA1 Hash | 902EF2DEEB3C5B13EA4C3D5193629309E231AE55
|
|
|
| | Свойства эмитента:
|
| | | Имя | GlobalSign Root CA
|
| | | Организация | GlobalSign nv-sa
|
| | | Подразделение | Root CA
|
| | | Страна | Belgium
|
|
|
| | Свойства субъекта:
|
| | | Имя | GlobalSign Organization Validation CA - SHA256 - G2
|
| | | Организация | GlobalSign nv-sa
|
| | | Страна | Belgium
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Go Daddy Secure Certificate Authority - G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 07
|
| | | Срок действия | 03.05.2011 - 03.05.2031
|
| | | MD5 Hash | 96C25031BC0DC35CFBA723731E1B4140
|
| | | SHA1 Hash | 27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
|
|
|
| | Свойства эмитента:
|
| | | Имя | Go Daddy Root Certificate Authority - G2
|
| | | Организация | GoDaddy.com, Inc.
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства субъекта:
|
| | | Имя | Go Daddy Secure Certificate Authority - G2
|
| | | Организация | GoDaddy.com, Inc.
|
| | | Подразделение | http://certs.godaddy.com/repository/
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / InCommon RSA Server CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 74 63 84 91 02 64 A1 17 7E 1A 46 85 FA D0 20 47
|
| | | Срок действия | 06.10.2014 - 06.10.2024
|
| | | MD5 Hash | CDE9A934D30976D6CEA979E50F494674
|
| | | SHA1 Hash | F5FB01DEA6E59CA6DD057054F4A3FF72DDE1D5C6
|
|
|
| | Свойства эмитента:
|
| | | Имя | USERTrust RSA Certification Authority
|
| | | Организация | The USERTRUST Network
|
| | | Страна | United States
|
| | | Местное название | Jersey City
|
| | | Область/район | New Jersey
|
|
|
| | Свойства субъекта:
|
| | | Имя | InCommon RSA Server CA
|
| | | Организация | Internet2
|
| | | Подразделение | InCommon
|
| | | Страна | United States
|
| | | Местное название | Ann Arbor
|
| | | Область/район | MI
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Let's Encrypt Authority X3 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 08 A7 EC 85 0B 6A 73 85 53 01 00 00 42 41 01 0A
|
| | | Срок действия | 17.03.2016 - 17.03.2021
|
| | | MD5 Hash | B15409274F54AD8F023D3B85A5ECEC5D
|
| | | SHA1 Hash | E6A3B45B062D509B3382282D196EFE97D5956CCB
|
|
|
| | Свойства эмитента:
|
| | | Имя | DST Root CA X3
|
| | | Организация | Digital Signature Trust Co.
|
|
|
| | Свойства субъекта:
|
| | | Имя | Let's Encrypt Authority X3
|
| | | Организация | Let's Encrypt
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Microsoft Windows Hardware Compatibility ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | A0 69 FE 8F 9A 3F D1 11 8B 19
|
| | | Срок действия | 01.10.1997 - 31.12.2002
|
| | | MD5 Hash | 09C254BDE4EA50F26D1497F29C51AF6D
|
| | | SHA1 Hash | 109F1CAED645BB78B3EA2B94C0697C740733031C
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Root Authority
|
| | | Подразделение | Copyright (c) 1997 Microsoft Corp.
|
| | | Подразделение | Microsoft Corporation
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Windows Hardware Compatibility
|
| | | Подразделение | Copyright (c) 1997 Microsoft Corp.
|
| | | Подразделение | Microsoft Windows Hardware Compatibility Intermediate CA
|
| | | Подразделение | Microsoft Corporation
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / RapidSSL RSA CA 2018 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 49 53 AB BB B4 02 D7 83 8C 5C 4B CD 46 A2 A5 08
|
| | | Срок действия | 06.11.2017 - 06.11.2027
|
| | | MD5 Hash | EB2F0FF332094D37434E4DBFBACC9470
|
| | | SHA1 Hash | 98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Global Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | RapidSSL RSA CA 2018
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Root Agency ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | F4 35 5C AA D4 B8 CF 11 8A 64 00 AA 00 6C 37 06
|
| | | Срок действия | 29.05.1996 - 01.01.2040
|
| | | MD5 Hash | C0A723F0DA35026B21EDB17597F1D470
|
| | | SHA1 Hash | FEE449EE0E3965A5246F000E87FDE2A065FD89D4
|
|
|
| | Свойства эмитента:
|
| | | Имя | Root Agency
|
|
|
| | Свойства субъекта:
|
| | | Имя | Root Agency
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / RU-CENTER High Assurance Services CA 2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 23 13 FD D5 84 F5 0D D1 C9 C2 33 AF 13 31 97 0B
|
| | | Срок действия | 21.01.2015 - 21.01.2025
|
| | | MD5 Hash | 9F5B91B6C168F131D7AEEDC12E377059
|
| | | SHA1 Hash | 0DC412DBC9BF0B4FCAC77A3B73AA07AA4FDEBD45
|
|
|
| | Свойства эмитента:
|
| | | Имя | USERTrust RSA Certification Authority
|
| | | Организация | The USERTRUST Network
|
| | | Страна | United States
|
| | | Местное название | Jersey City
|
| | | Область/район | New Jersey
|
|
|
| | Свойства субъекта:
|
| | | Имя | RU-CENTER High Assurance Services CA 2
|
| | | Организация | RU-Center (ЗАО Региональный Сетевой Информационный Центр)
|
| | | Страна | Russia
|
| | | Местное название | Moscow
|
| | | Область/район | Moscow
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Symantec Class 3 Extended Validation SHA256 SSL CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 82 D9 F6 CF 56 56 05 CA 16 49 0B 7F FD 49 B7 09
|
| | | Срок действия | 09.04.2013 - 09.04.2023
|
| | | MD5 Hash | BD80A3317D837CA8D729C62B83D79BFA
|
| | | SHA1 Hash | CDF428A890D3748C5D28ED1F4C69499A3E16F133
|
|
|
| | Свойства эмитента:
|
| | | Имя | VeriSign Universal Root Certification Authority
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2008 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | Symantec Class 3 Extended Validation SHA256 SSL CA
|
| | | Организация | Symantec Corporation
|
| | | Подразделение | Symantec Trust Network
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / thawte DV SSL SHA256 CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | AA 10 1D 80 D4 DE 26 7B 51 0A 2C ED 5A 34 23 3E
|
| | | Срок действия | 10.06.2014 - 10.06.2024
|
| | | MD5 Hash | EE40CD0440DC671B334F47C8AAB2EFB1
|
| | | SHA1 Hash | 50F125EFCA2428FF17D204B89E5264509A283DA7
|
|
|
| | Свойства эмитента:
|
| | | Имя | thawte Primary Root CA - G3
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2008 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | thawte DV SSL SHA256 CA
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Domain Validated SSL
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / Thawte RSA CA 2018 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 2B 70 E6 1A B2 04 21 6C 0D 7E 6F 19 EF 8A 5A 02
|
| | | Срок действия | 06.11.2017 - 06.11.2027
|
| | | MD5 Hash | 42672E72F86C9BA154608D36BCCD3C61
|
| | | SHA1 Hash | 4DEEA7060D80BABF1643B4E0F0104C82995075B7
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Global Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | Thawte RSA CA 2018
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / thawte SSL CA - G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 97 65 BF 11 BF 3D 23 85 06 30 E2 6D 88 D6 87 16
|
| | | Срок действия | 31.10.2013 - 31.10.2023
|
| | | MD5 Hash | 51EE3EB661308E2D20E0436ED06679F0
|
| | | SHA1 Hash | 2EA71C367D178C843FD21DB4FDB630BA54A20DC5
|
|
|
| | Свойства эмитента:
|
| | | Имя | thawte Primary Root CA
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2006 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | thawte SSL CA - G2
|
| | | Организация | thawte, Inc.
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / USERTrust RSA Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 36 43 61 80 09 63 36 0C ED EC F4 5B 70 28 EA 13
|
| | | Срок действия | 30.05.2000 - 30.05.2020
|
| | | MD5 Hash | DB78CBD190952735D940BC80AC2432C0
|
| | | SHA1 Hash | EAB040689A0D805B5D6FD654FC168CFF00B78BE3
|
|
|
| | Свойства эмитента:
|
| | | Имя | AddTrust External CA Root
|
| | | Организация | AddTrust AB
|
| | | Подразделение | AddTrust External TTP Network
|
| | | Страна | Sweden
|
|
|
| | Свойства субъекта:
|
| | | Имя | USERTrust RSA Certification Authority
|
| | | Организация | The USERTRUST Network
|
| | | Страна | United States
|
| | | Местное название | Jersey City
|
| | | Область/район | New Jersey
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / VeriSign Class 3 Code Signing 2010 CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | C7 33 4B D4 C9 96 ED 86 1A FC 56 25 AA E5 00 52
|
| | | Срок действия | 08.02.2010 - 08.02.2020
|
| | | MD5 Hash | 4DF6E0FC400CAE9C052FAE98C66D379F
|
| | | SHA1 Hash | 495847A93187CFB8C71F840CB7B41497AD95C64F
|
|
|
| | Свойства эмитента:
|
| | | Имя | VeriSign Class 3 Public Primary Certification Authority - G5
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2006 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | VeriSign Class 3 Code Signing 2010 CA
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | Terms of use at https://www.verisign.com/rpa (c)10
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Certificate Authorities / www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 8F 07 93 3F 23 98 60 92 0F 2F D0 B4 BA EB FC 46
|
| | | Срок действия | 17.04.1997 - 25.10.2016
|
| | | MD5 Hash | ACD80EA27BB72CE700DC22724A5F1E92
|
| | | SHA1 Hash | D559A586669B08F46A30A133F8A9ED3D038E2EA8
|
|
|
| | Свойства эмитента:
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | Class 3 Public Primary Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Организация | VeriSign Trust Network
|
| | | Подразделение | VeriSign, Inc.
|
| | | Подразделение | VeriSign International Server CA - Class 3
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Certigna ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | FF 48 C9 0F 01 E3 DC FE 00
|
| | | Срок действия | 29.06.2007 - 29.06.2027
|
| | | MD5 Hash | AB57A65B7D428219B5D85826285EFDFF
|
| | | SHA1 Hash | B12E13634586A46F1AB2606837582DC4ACFD9497
|
|
|
| | Свойства эмитента:
|
| | | Имя | Certigna
|
| | | Организация | Dhimyotis
|
| | | Страна | France
|
|
|
| | Свойства субъекта:
|
| | | Имя | Certigna
|
| | | Организация | Dhimyotis
|
| | | Страна | France
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Certum Trusted Network CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | C0 44 04
|
| | | Срок действия | 22.10.2008 - 31.12.2029
|
| | | MD5 Hash | D5E98140C51869FC462C8975620FAA78
|
| | | SHA1 Hash | 07E032E020B72C3F192F0628A2593A19A70F069E
|
|
|
| | Свойства эмитента:
|
| | | Имя | Certum Trusted Network CA
|
| | | Организация | Unizeto Technologies S.A.
|
| | | Подразделение | Certum Certification Authority
|
| | | Страна | Poland
|
|
|
| | Свойства субъекта:
|
| | | Имя | Certum Trusted Network CA
|
| | | Организация | Unizeto Technologies S.A.
|
| | | Подразделение | Certum Certification Authority
|
| | | Страна | Poland
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Certum ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 20 00 01
|
| | | Срок действия | 11.06.2002 - 11.06.2027
|
| | | MD5 Hash | 2C8F9F661D1890B147269D8E86828CA9
|
| | | SHA1 Hash | 6252DC40F71143A22FDE9EF7348E064251B18118
|
|
|
| | Свойства эмитента:
|
| | | Имя | Certum CA
|
| | | Организация | Unizeto Sp. z o.o.
|
| | | Страна | Poland
|
|
|
| | Свойства субъекта:
|
| | | Имя | Certum CA
|
| | | Организация | Unizeto Sp. z o.o.
|
| | | Страна | Poland
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / COMODO SECURE™ ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 9D 86 03 5B D8 4E F7 1F E0 6F 63 DB CA F9 AA 4C
|
| | | Срок действия | 19.01.2010 - 19.01.2038
|
| | | MD5 Hash | 1B31B0714036CC143691ADC43EFDEC18
|
| | | SHA1 Hash | AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
|
|
|
| | Свойства эмитента:
|
| | | Имя | COMODO RSA Certification Authority
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства субъекта:
|
| | | Имя | COMODO RSA Certification Authority
|
| | | Организация | COMODO CA Limited
|
| | | Страна | United Kingdom
|
| | | Местное название | Salford
|
| | | Область/район | Greater Manchester
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert Baltimore Root ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | B9 00 00 02
|
| | | Срок действия | 12.05.2000 - 13.05.2025
|
| | | MD5 Hash | ACB694A59C17E0D791529BB19706A6E4
|
| | | SHA1 Hash | D4DE20D05E66FC53FE1A50882C78DB2852CAE474
|
|
|
| | Свойства эмитента:
|
| | | Имя | Baltimore CyberTrust Root
|
| | | Организация | Baltimore
|
| | | Подразделение | CyberTrust
|
| | | Страна | Ireland
|
|
|
| | Свойства субъекта:
|
| | | Имя | Baltimore CyberTrust Root
|
| | | Организация | Baltimore
|
| | | Подразделение | CyberTrust
|
| | | Страна | Ireland
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert Global Root G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | E5 FA 09 1D B1 64 28 BB A0 A9 11 A7 E6 F1 3A 03
|
| | | Срок действия | 01.08.2013 - 15.01.2038
|
| | | MD5 Hash | E4A68AC854AC5242460AFD72481B2A44
|
| | | SHA1 Hash | DF3C24F9BFD666761B268073FE06D1CC8D4F82A4
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Global Root G2
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | DigiCert Global Root G2
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert Global Root ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V1
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | A5 01
|
| | | Срок действия | 13.08.1998 - 14.08.2018
|
| | | MD5 Hash | CA3DD368F1035CD032FAB82B59E85ADB
|
| | | SHA1 Hash | 97817950D81C9670CC34D809CF794431367EF474
|
|
|
| | Свойства эмитента:
|
| | | Имя | GTE CyberTrust Global Root
|
| | | Организация | GTE Corporation
|
| | | Подразделение | GTE CyberTrust Solutions, Inc.
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | GTE CyberTrust Global Root
|
| | | Организация | GTE Corporation
|
| | | Подразделение | GTE CyberTrust Solutions, Inc.
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 39 30 F0 1B FC 60 E5 8F FE 46 D8 17 E5 E0 E7 0C
|
| | | Срок действия | 10.11.2006 - 10.11.2031
|
| | | MD5 Hash | 87CE0B7B2A0E4900E158719B37A89372
|
| | | SHA1 Hash | 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Assured ID Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | DigiCert Assured ID Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 4A C7 91 59 C9 6A 75 A1 B1 46 42 90 56 E0 3B 08
|
| | | Срок действия | 10.11.2006 - 10.11.2031
|
| | | MD5 Hash | 79E4A9840D7D3A96D7C04FE2434C892E
|
| | | SHA1 Hash | A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert Global Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | DigiCert Global Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DigiCert ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 77 25 46 AE F2 79 0B 8F 9B 40 0B 6A 26 5C AC 02
|
| | | Срок действия | 10.11.2006 - 10.11.2031
|
| | | MD5 Hash | D474DE575C39B2D39C8583C5C065498A
|
| | | SHA1 Hash | 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
|
|
|
| | Свойства эмитента:
|
| | | Имя | DigiCert High Assurance EV Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | DigiCert High Assurance EV Root CA
|
| | | Организация | DigiCert Inc
|
| | | Подразделение | www.digicert.com
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / DST Root CA X3 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 6B 40 F8 2E 86 39 30 89 BA 27 A3 D6 80 B0 AF 44
|
| | | Срок действия | 01.10.2000 - 30.09.2021
|
| | | MD5 Hash | 410352DC0FF7501B16F0028EBA6F45C5
|
| | | SHA1 Hash | DAC9024F54D8F6DF94935FB1732638CA6AD77C13
|
|
|
| | Свойства эмитента:
|
| | | Имя | DST Root CA X3
|
| | | Организация | Digital Signature Trust Co.
|
|
|
| | Свойства субъекта:
|
| | | Имя | DST Root CA X3
|
| | | Организация | Digital Signature Trust Co.
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Entrust.net ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 28 8C 53 4A
|
| | | Срок действия | 07.07.2009 - 07.12.2030
|
| | | MD5 Hash | 4BE2C99196650CF40E5A9392A00AFEB2
|
| | | SHA1 Hash | 8CF427FD790C3AD166068DE81E57EFBB932272D4
|
|
|
| | Свойства эмитента:
|
| | | Имя | Entrust Root Certification Authority - G2
|
| | | Организация | Entrust, Inc.
|
| | | Подразделение | See www.entrust.net/legal-terms
|
| | | Подразделение | (c) 2009 Entrust, Inc. - for authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | Entrust Root Certification Authority - G2
|
| | | Организация | Entrust, Inc.
|
| | | Подразделение | See www.entrust.net/legal-terms
|
| | | Подразделение | (c) 2009 Entrust, Inc. - for authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Entrust ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 54 50 6B 45
|
| | | Срок действия | 27.11.2006 - 27.11.2026
|
| | | MD5 Hash | D6A5C3ED5DDD3E00C13D87921F1D3FE4
|
| | | SHA1 Hash | B31EB1B740E36C8402DADC37D44DF5D4674952F9
|
|
|
| | Свойства эмитента:
|
| | | Имя | Entrust Root Certification Authority
|
| | | Организация | Entrust, Inc.
|
| | | Подразделение | www.entrust.net/CPS is incorporated by reference
|
| | | Подразделение | (c) 2006 Entrust, Inc.
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | Entrust Root Certification Authority
|
| | | Организация | Entrust, Inc.
|
| | | Подразделение | www.entrust.net/CPS is incorporated by reference
|
| | | Подразделение | (c) 2006 Entrust, Inc.
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GeoTrust Global CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 56 34 02
|
| | | Срок действия | 21.05.2002 - 21.05.2022
|
| | | MD5 Hash | F775AB29FB514EB7775EFF053C998EF5
|
| | | SHA1 Hash | DE28F4A4FFE5B92FA3C503D1A349A7F9962A8212
|
|
|
| | Свойства эмитента:
|
| | | Имя | GeoTrust Global CA
|
| | | Организация | GeoTrust Inc.
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | GeoTrust Global CA
|
| | | Организация | GeoTrust Inc.
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GeoTrust Primary Certification Authority - G3 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 1F 0F 18 C3 A9 27 F6 41 4B 79 B2 19 94 6E AC 15
|
| | | Срок действия | 02.04.2008 - 02.12.2037
|
| | | MD5 Hash | B5E83436C910445848706D2E83D4B805
|
| | | SHA1 Hash | 039EEDB80BE7A03C6953893B20D2D9323A4C2AFD
|
|
|
| | Свойства эмитента:
|
| | | Имя | GeoTrust Primary Certification Authority - G3
|
| | | Организация | GeoTrust Inc.
|
| | | Подразделение | (c) 2008 GeoTrust Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | GeoTrust Primary Certification Authority - G3
|
| | | Организация | GeoTrust Inc.
|
| | | Подразделение | (c) 2008 GeoTrust Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GeoTrust ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | CF F4 DE 35
|
| | | Срок действия | 22.08.1998 - 22.08.2018
|
| | | MD5 Hash | 67CB9DC013248A829BB2171ED11BECD4
|
| | | SHA1 Hash | D23209AD23D314232174E40D7F9D62139786633A
|
|
|
| | Свойства эмитента:
|
| | | Организация | Equifax
|
| | | Подразделение | Equifax Secure Certificate Authority
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Организация | Equifax
|
| | | Подразделение | Equifax Secure Certificate Authority
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GeoTrust ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | A1 C4 FA DA AF 6C 63 3A 15 B6 69 FD 6A B5 AC 18
|
| | | Срок действия | 27.11.2006 - 17.07.2036
|
| | | MD5 Hash | 0226C3015E08303743A9D07DCF37E6BF
|
| | | SHA1 Hash | 323C118E1BF7B8B65254E2E2100DD6029037F096
|
|
|
| | Свойства эмитента:
|
| | | Имя | GeoTrust Primary Certification Authority
|
| | | Организация | GeoTrust Inc.
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | GeoTrust Primary Certification Authority
|
| | | Организация | GeoTrust Inc.
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GlobalSign Root CA - R1 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 94 C3 5A 4B 15 01 00 00 00 00 04
|
| | | Срок действия | 01.09.1998 - 28.01.2028
|
| | | MD5 Hash | 3E455215095192E1B75D379FB187298A
|
| | | SHA1 Hash | B1BC968BD4F49D622AA89A81F2150152A41D829C
|
|
|
| | Свойства эмитента:
|
| | | Имя | GlobalSign Root CA
|
| | | Организация | GlobalSign nv-sa
|
| | | Подразделение | Root CA
|
| | | Страна | Belgium
|
|
|
| | Свойства субъекта:
|
| | | Имя | GlobalSign Root CA
|
| | | Организация | GlobalSign nv-sa
|
| | | Подразделение | Root CA
|
| | | Страна | Belgium
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / GlobalSign Root CA - R3 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | A2 08 53 58 21 01 00 00 00 00 04
|
| | | Срок действия | 18.03.2009 - 18.03.2029
|
| | | MD5 Hash | C5DFB849CA051355EE2DBA1AC33EB028
|
| | | SHA1 Hash | D69B561148F01C77C54578C10926DF5B856976AD
|
|
|
| | Свойства эмитента:
|
| | | Имя | GlobalSign
|
| | | Организация | GlobalSign
|
| | | Подразделение | GlobalSign Root CA - R3
|
|
|
| | Свойства субъекта:
|
| | | Имя | GlobalSign
|
| | | Организация | GlobalSign
|
| | | Подразделение | GlobalSign Root CA - R3
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Go Daddy Class 2 Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 00
|
| | | Срок действия | 29.06.2004 - 29.06.2034
|
| | | MD5 Hash | 91DE0625ABDAFD32170CBB25172A8467
|
| | | SHA1 Hash | 2796BAE63F1801E277261BA0D77770028F20EEE4
|
|
|
| | Свойства эмитента:
|
| | | Организация | The Go Daddy Group, Inc.
|
| | | Подразделение | Go Daddy Class 2 Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Организация | The Go Daddy Group, Inc.
|
| | | Подразделение | Go Daddy Class 2 Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Go Daddy Root Certificate Authority – G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 00
|
| | | Срок действия | 01.09.2009 - 01.01.2038
|
| | | MD5 Hash | 803ABC22C1E6FB8D9B3B274A321B9A01
|
| | | SHA1 Hash | 47BEABC922EAE80E78783462A79F45C254FDE68B
|
|
|
| | Свойства эмитента:
|
| | | Имя | Go Daddy Root Certificate Authority - G2
|
| | | Организация | GoDaddy.com, Inc.
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства субъекта:
|
| | | Имя | Go Daddy Root Certificate Authority - G2
|
| | | Организация | GoDaddy.com, Inc.
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Google Trust Services - GlobalSign Root CA-R2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 0D E6 26 86 0F 01 00 00 00 00 04
|
| | | Срок действия | 15.12.2006 - 15.12.2021
|
| | | MD5 Hash | 9414777E3E5EFD8F30BD41B0CFE7D030
|
| | | SHA1 Hash | 75E0ABB6138512271C04F85FDDDE38E4B7242EFE
|
|
|
| | Свойства эмитента:
|
| | | Имя | GlobalSign
|
| | | Организация | GlobalSign
|
| | | Подразделение | GlobalSign Root CA - R2
|
|
|
| | Свойства субъекта:
|
| | | Имя | GlobalSign
|
| | | Организация | GlobalSign
|
| | | Подразделение | GlobalSign Root CA - R2
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Kaspersky Anti-Virus Personal Root Certificate ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 62 6C 23 5C 01 00 00 00 41
|
| | | Срок действия | 28.12.2008 - 23.12.2028
|
| | | MD5 Hash | C1536D0D3AE9ACF7EB3C11340A07AEE1
|
| | | SHA1 Hash | 9D697FAE5DC719218E3761C9BFB1D7047C3E20A4
|
|
|
| | Свойства эмитента:
|
| | | Имя | Kaspersky Anti-Virus Personal Root Certificate
|
| | | Организация | AO Kaspersky Lab
|
|
|
| | Свойства субъекта:
|
| | | Имя | Kaspersky Anti-Virus Personal Root Certificate
|
| | | Организация | AO Kaspersky Lab
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Authenticode(tm) Root ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | 01
|
| | | Срок действия | 01.01.1995 - 01.01.2000
|
| | | MD5 Hash | DC6D6FAF897CDD17332FB5BA9035E9CE
|
| | | SHA1 Hash | 7F88CD7223F3C813818C994614A89C99FA3B5247
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Authenticode(tm) Root Authority
|
| | | Организация | MSFT
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Authenticode(tm) Root Authority
|
| | | Организация | MSFT
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Root Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | 40 DF EC 63 F6 3E D1 11 88 3C 3C 8B 00 C1 00
|
| | | Срок действия | 10.01.1997 - 31.12.2020
|
| | | MD5 Hash | 2A954ECA79B2874573D92D90BAF99FB6
|
| | | SHA1 Hash | A43489159A520F0D93D032CCAF37E7FE20A8B419
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Root Authority
|
| | | Подразделение | Copyright (c) 1997 Microsoft Corp.
|
| | | Подразделение | Microsoft Corporation
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Root Authority
|
| | | Подразделение | Copyright (c) 1997 Microsoft Corp.
|
| | | Подразделение | Microsoft Corporation
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Root Certificate Authority 2010 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | AA 39 43 6B 58 9B 9A 44 AC 44 BA BF 25 3A CC 28
|
| | | Срок действия | 24.06.2010 - 24.06.2035
|
| | | MD5 Hash | A266BB7DCC38A562631361BBF61DD11B
|
| | | SHA1 Hash | 3B1EFD3A66EA28B16697394703A72CA340A05BD5
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Root Certificate Authority 2010
|
| | | Организация | Microsoft Corporation
|
| | | Страна | United States
|
| | | Местное название | Redmond
|
| | | Область/район | Washington
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Root Certificate Authority 2010
|
| | | Организация | Microsoft Corporation
|
| | | Страна | United States
|
| | | Местное название | Redmond
|
| | | Область/район | Washington
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Root Certificate Authority 2011 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 44 E1 42 6C D6 69 B5 43 96 B2 9F FC B5 C8 8B 3F
|
| | | Срок действия | 23.03.2011 - 23.03.2036
|
| | | MD5 Hash | CE0490D5E56C34A5AE0BE98BE581185D
|
| | | SHA1 Hash | 8F43288AD272F3103B6FB1428485EA3014C0BCFE
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Root Certificate Authority 2011
|
| | | Организация | Microsoft Corporation
|
| | | Страна | United States
|
| | | Местное название | Redmond
|
| | | Область/район | Washington
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Root Certificate Authority 2011
|
| | | Организация | Microsoft Corporation
|
| | | Страна | United States
|
| | | Местное название | Redmond
|
| | | Область/район | Washington
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Root Certificate Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 65 2E 13 07 F4 58 73 4C AD A5 A0 4A A1 16 AD 79
|
| | | Срок действия | 10.05.2001 - 10.05.2021
|
| | | MD5 Hash | E1C07EA0AABBD4B77B84C228117808A7
|
| | | SHA1 Hash | CDD4EEAE6000AC7F40C3802C171E30148030C072
|
|
|
| | Свойства эмитента:
|
| | | Имя | Microsoft Root Certificate Authority
|
|
|
| | Свойства субъекта:
|
| | | Имя | Microsoft Root Certificate Authority
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Microsoft Timestamp Root ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V1
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | 01
|
| | | Срок действия | 13.05.1997 - 31.12.1999
|
| | | MD5 Hash | 556EBEF54C1D7C0360C43418BC9649C1
|
| | | SHA1 Hash | 245C97DF7514E7CF2DF8BE72AE957B9E04741E85
|
|
|
| | Свойства эмитента:
|
| | | Организация | Microsoft Trust Network
|
| | | Подразделение | Microsoft Corporation
|
| | | Подразделение | Microsoft Time Stamping Service Root
|
|
|
| | Свойства субъекта:
|
| | | Организация | Microsoft Trust Network
|
| | | Подразделение | Microsoft Corporation
|
| | | Подразделение | Microsoft Time Stamping Service Root
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / QuoVadis Root Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 8B 50 B6 3A
|
| | | Срок действия | 19.03.2001 - 17.03.2021
|
| | | MD5 Hash | 27DE36FE72B70003009DF4F01E6C0424
|
| | | SHA1 Hash | DE3F40BD5093D39B6C60F6DABC076201008976C9
|
|
|
| | Свойства эмитента:
|
| | | Имя | QuoVadis Root Certification Authority
|
| | | Организация | QuoVadis Limited
|
| | | Подразделение | Root Certification Authority
|
| | | Страна | Bermuda
|
|
|
| | Свойства субъекта:
|
| | | Имя | QuoVadis Root Certification Authority
|
| | | Организация | QuoVadis Limited
|
| | | Подразделение | Root Certification Authority
|
| | | Страна | Bermuda
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Starfield Class 2 Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 00
|
| | | Срок действия | 29.06.2004 - 29.06.2034
|
| | | MD5 Hash | 324A4BBBC863699BBE749AC6DD1D4624
|
| | | SHA1 Hash | AD7E1C28B064EF8F6003402014C3D0E3370EB58A
|
|
|
| | Свойства эмитента:
|
| | | Организация | Starfield Technologies, Inc.
|
| | | Подразделение | Starfield Class 2 Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Организация | Starfield Technologies, Inc.
|
| | | Подразделение | Starfield Class 2 Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Starfield Root Certificate Authority – G2 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 00
|
| | | Срок действия | 01.09.2009 - 01.01.2038
|
| | | MD5 Hash | D63981C6527E9669FCFCCA66ED05F296
|
| | | SHA1 Hash | B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E
|
|
|
| | Свойства эмитента:
|
| | | Имя | Starfield Root Certificate Authority - G2
|
| | | Организация | Starfield Technologies, Inc.
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства субъекта:
|
| | | Имя | Starfield Root Certificate Authority - G2
|
| | | Организация | Starfield Technologies, Inc.
|
| | | Страна | United States
|
| | | Местное название | Scottsdale
|
| | | Область/район | Arizona
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / thawte Primary Root CA - G3 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | FB 90 F7 2F 4B D6 9A B4 B4 EA A7 46 B7 97 01 60
|
| | | Срок действия | 02.04.2008 - 02.12.2037
|
| | | MD5 Hash | FB1B5D438A94CD44C676F2434B47E731
|
| | | SHA1 Hash | F18B538D1BE903B6A6F056435B171589CAF36BF2
|
|
|
| | Свойства эмитента:
|
| | | Имя | thawte Primary Root CA - G3
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2008 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | thawte Primary Root CA - G3
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2008 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / Thawte Timestamping CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | 00
|
| | | Срок действия | 01.01.1997 - 01.01.2021
|
| | | MD5 Hash | 7F667A71D3EB6978209A51149D83DA20
|
| | | SHA1 Hash | BE36A4562FB2EE05DBB3D32323ADF445084ED656
|
|
|
| | Свойства эмитента:
|
| | | Имя | Thawte Timestamping CA
|
| | | Организация | Thawte
|
| | | Подразделение | Thawte Certification
|
| | | Страна | South Africa
|
| | | Местное название | Durbanville
|
| | | Область/район | Western Cape
|
|
|
| | Свойства субъекта:
|
| | | Имя | Thawte Timestamping CA
|
| | | Организация | Thawte
|
| | | Подразделение | Thawte Certification
|
| | | Страна | South Africa
|
| | | Местное название | Durbanville
|
| | | Область/район | Western Cape
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / thawte ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | 01
|
| | | Срок действия | 01.08.1996 - 01.01.2021
|
| | | MD5 Hash | 069F6979166690021B8C8CA2C3076F3A
|
| | | SHA1 Hash | 627F8D7827656399D27D7F9044C9FEB3F33EFA9A
|
|
|
| | Свойства эмитента:
|
| | | Имя | Thawte Premium Server CA
|
| | | Организация | Thawte Consulting cc
|
| | | Подразделение | Certification Services Division
|
| | | Страна | South Africa
|
| | | Местное название | Cape Town
|
| | | Область/район | Western Cape
|
| | | E-mail | premium-server@thawte.com
|
|
|
| | Свойства субъекта:
|
| | | Имя | Thawte Premium Server CA
|
| | | Организация | Thawte Consulting cc
|
| | | Подразделение | Certification Services Division
|
| | | Страна | South Africa
|
| | | Местное название | Cape Town
|
| | | Область/район | Western Cape
|
| | | E-mail | premium-server@thawte.com
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / thawte ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 6D 2B DB 37 CE 2F F4 49 EC ED D5 20 57 D5 4E 34
|
| | | Срок действия | 17.11.2006 - 17.07.2036
|
| | | MD5 Hash | 8CCADC0B22CEF5BE72AC411A11A8D812
|
| | | SHA1 Hash | 91C6D6EE3E8AC86384E548C299295C756C817B81
|
|
|
| | Свойства эмитента:
|
| | | Имя | thawte Primary Root CA
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2006 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | thawte Primary Root CA
|
| | | Организация | thawte, Inc.
|
| | | Подразделение | Certification Services Division
|
| | | Подразделение | (c) 2006 thawte, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / The USERTrust Network™ ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 01
|
| | | Срок действия | 30.05.2000 - 30.05.2020
|
| | | MD5 Hash | 1D3554048578B03F42424DBF20730A3F
|
| | | SHA1 Hash | 02FAF3E291435468607857694DF5E45B68851868
|
|
|
| | Свойства эмитента:
|
| | | Имя | AddTrust External CA Root
|
| | | Организация | AddTrust AB
|
| | | Подразделение | AddTrust External TTP Network
|
| | | Страна | Sweden
|
|
|
| | Свойства субъекта:
|
| | | Имя | AddTrust External CA Root
|
| | | Организация | AddTrust AB
|
| | | Подразделение | AddTrust External TTP Network
|
| | | Страна | Sweden
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / USERTrust (Code Signing) ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 1B 5F B3 E0 2D 36 D3 11 B4 24 00 50 8B 0C BE 44
|
| | | Срок действия | 09.07.1999 - 09.07.2019
|
| | | MD5 Hash | A7F2E41606411150306B9CE3B49CB0C9
|
| | | SHA1 Hash | E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
|
|
|
| | Свойства эмитента:
|
| | | Имя | UTN-USERFirst-Object
|
| | | Организация | The USERTRUST Network
|
| | | Подразделение | http://www.usertrust.com
|
| | | Страна | United States
|
| | | Местное название | Salt Lake City
|
| | | Область/район | UT
|
|
|
| | Свойства субъекта:
|
| | | Имя | UTN-USERFirst-Object
|
| | | Организация | The USERTRUST Network
|
| | | Подразделение | http://www.usertrust.com
|
| | | Страна | United States
|
| | | Местное название | Salt Lake City
|
| | | Область/район | UT
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / USERTrust Secure™ ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA384 RSA (1.2.840.113549.1.1.12)
|
| | | Серийный номер | 2D 03 35 0E 64 BC 1B A8 51 CA A3 FC 30 6D FD 01
|
| | | Срок действия | 01.02.2010 - 19.01.2038
|
| | | MD5 Hash | 1BFE69D191B71933A372A80FE155E5B5
|
| | | SHA1 Hash | 2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
|
|
|
| | Свойства эмитента:
|
| | | Имя | USERTrust RSA Certification Authority
|
| | | Организация | The USERTRUST Network
|
| | | Страна | United States
|
| | | Местное название | Jersey City
|
| | | Область/район | New Jersey
|
|
|
| | Свойства субъекта:
|
| | | Имя | USERTrust RSA Certification Authority
|
| | | Организация | The USERTRUST Network
|
| | | Страна | United States
|
| | | Местное название | Jersey City
|
| | | Область/район | New Jersey
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / VeriSign Class 3 Public Primary CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V1
|
| | | Алгоритм подписи | MD2 RSA (1.2.840.113549.1.1.2)
|
| | | Серийный номер | BF BA CC 03 7B CA 38 B6 34 29 D9 10 1D E4 BA 70
|
| | | Срок действия | 29.01.1996 - 02.08.2028
|
| | | MD5 Hash | 10FC635DF6263E0DF325BE5F79CD6767
|
| | | SHA1 Hash | 742C3192E607E424EB4549542BE1BBC53E6174E2
|
|
|
| | Свойства эмитента:
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | Class 3 Public Primary Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | Class 3 Public Primary Certification Authority
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / VeriSign Time Stamping CA ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V1
|
| | | Алгоритм подписи | MD5 RSA (1.2.840.113549.1.1.4)
|
| | | Серийный номер | A3 DC 5D 15 5F 73 5D A5 1C 59 82 8C 38 D2 19 4A
|
| | | Срок действия | 12.05.1997 - 08.01.2004
|
| | | MD5 Hash | EBB04F1D3A2E372F1DDA6E27D6B680FA
|
| | | SHA1 Hash | 18F7C1FCC3090203FD5BAA2F861A754976C8DD25
|
|
|
| | Свойства эмитента:
|
| | | Организация | VeriSign Trust Network
|
| | | Подразделение | VeriSign, Inc.
|
| | | Подразделение | VeriSign Time Stamping Service Root
|
| | | Подразделение | NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.
|
|
|
| | Свойства субъекта:
|
| | | Организация | VeriSign Trust Network
|
| | | Подразделение | VeriSign, Inc.
|
| | | Подразделение | VeriSign Time Stamping Service Root
|
| | | Подразделение | NO LIABILITY ACCEPTED, (c)97 VeriSign, Inc.
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / VeriSign Universal Root Certification Authority ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA256 RSA (1.2.840.113549.1.1.11)
|
| | | Серийный номер | 1D C5 1A 12 E4 BB 0E 03 21 13 B3 21 64 C4 1A 40
|
| | | Срок действия | 02.04.2008 - 02.12.2037
|
| | | MD5 Hash | 8EADB501AA4D81E48C1DD1E114009519
|
| | | SHA1 Hash | 3679CA35668772304D30A5FB873B0FA77BB70D54
|
|
|
| | Свойства эмитента:
|
| | | Имя | VeriSign Universal Root Certification Authority
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2008 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | VeriSign Universal Root Certification Authority
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2008 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / VeriSign ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V1
|
| | | Алгоритм подписи | MD2 RSA (1.2.840.113549.1.1.2)
|
| | | Серийный номер | 10 67 FA 82 AD 1A BB 3C DF 28 92 DB 37 8F C7 03
|
| | | Срок действия | 09.04.1996 - 08.01.2004
|
| | | MD5 Hash | DD753F56BFBBC5A17A1553C690F9FBCC
|
| | | SHA1 Hash | 24A40A1F573643A67F0A4B0749F6A22BF28ABB6B
|
|
|
| | Свойства эмитента:
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Commercial Software Publishers CA
|
| | | Местное название | Интернет
|
|
|
| | Свойства субъекта:
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Commercial Software Publishers CA
|
| | | Местное название | Интернет
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Root Certificates / VeriSign ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | SHA1 RSA (1.2.840.113549.1.1.5)
|
| | | Серийный номер | 4A 3B 6B CC CD 58 21 4A BB E8 7D 26 9E D1 DA 18
|
| | | Срок действия | 08.11.2006 - 17.07.2036
|
| | | MD5 Hash | CB17E431673EE209FE455793F30AFA1C
|
| | | SHA1 Hash | 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
|
|
|
| | Свойства эмитента:
|
| | | Имя | VeriSign Class 3 Public Primary Certification Authority - G5
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2006 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства субъекта:
|
| | | Имя | VeriSign Class 3 Public Primary Certification Authority - G5
|
| | | Организация | VeriSign, Inc.
|
| | | Подразделение | VeriSign Trust Network
|
| | | Подразделение | (c) 2006 VeriSign, Inc. - For authorized use only
|
| | | Страна | United States
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / AVP_pers ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 1B 31 19 30 17 06 03 55 04 03 1E 10 00 41 00 56 00 50 00 5F 00 70 00 65 00 72 00 73
|
| | | Срок действия | 02.04.2018 - 02.04.2018
|
| | | MD5 Hash | E56B6D17B2B40ADD67B22F80C23DCAB2
|
| | | SHA1 Hash | 9117EABCFA2E5067B53068255C65C4C3D879572E
|
|
|
| | Свойства эмитента:
|
| | | Имя | AVP_pers
|
|
|
| | Свойства субъекта:
|
| | | Имя | AVP_pers
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / AVP19 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 10 31 0E 30 0C 06 03 55 04 03 13 05 41 56 50 31 39
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | FA29DD1D5172835577D5746FCFD57754
|
| | | SHA1 Hash | 21527D72A1212CD370CD83BC35C4E19552B081B2
|
|
|
| | Свойства эмитента:
|
| | | Имя | AVP19
|
|
|
| | Свойства субъекта:
|
| | | Имя | AVP19
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / kav_pers ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 1B 31 19 30 17 06 03 55 04 03 1E 10 00 6B 00 61 00 76 00 5F 00 70 00 65 00 72 00 73
|
| | | Срок действия | 02.04.2018 - 02.04.2018
|
| | | MD5 Hash | 1B26C21A71144BCDC0439256F94DADC1
|
| | | SHA1 Hash | B0124E6DE6C9543BA86FDFA7D8C92D0C48865D9B
|
|
|
| | Свойства эмитента:
|
| | | Имя | kav_pers
|
|
|
| | Свойства субъекта:
|
| | | Имя | kav_pers
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / kav18 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 10 31 0E 30 0C 06 03 55 04 03 13 05 6B 61 76 31 38
|
| | | Срок действия | 02.04.2018 - 02.04.2018
|
| | | MD5 Hash | D821DA3BA32DC3F56EBE41D01AD2E512
|
| | | SHA1 Hash | 60D4FA72B4F9D512854E305016C43728CBC6FF60
|
|
|
| | Свойства эмитента:
|
| | | Имя | kav18
|
|
|
| | Свойства субъекта:
|
| | | Имя | kav18
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / kav19 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 10 31 0E 30 0C 06 03 55 04 03 13 05 6B 61 76 31 39
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | 788E226184B9E7B0E8AA282B7CD60EF9
|
| | | SHA1 Hash | 4ED4295E4AFF04B7D3CA943CB370368FAB0B6F74
|
|
|
| | Свойства эмитента:
|
| | | Имя | kav19
|
|
|
| | Свойства субъекта:
|
| | | Имя | kav19
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / ksde18 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 11 31 0F 30 0D 06 03 55 04 03 13 06 6B 73 64 65 31 38
|
| | | Срок действия | 02.04.2018 - 02.04.2018
|
| | | MD5 Hash | EB92E66F0DE52C6314C5AD5EF1D40623
|
| | | SHA1 Hash | E57DCF081F2BDBC3DB3C29231663A2726E9D4DCB
|
|
|
| | Свойства эмитента:
|
| | | Имя | ksde18
|
|
|
| | Свойства субъекта:
|
| | | Имя | ksde18
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / kts_pers ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 1B 31 19 30 17 06 03 55 04 03 1E 10 00 6B 00 74 00 73 00 5F 00 70 00 65 00 72 00 73
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | B9014CCFAE2ECAF002E00323F4919A91
|
| | | SHA1 Hash | BC87BA3EDA9E243517EDE0BAC0F2E254B7438A7C
|
|
|
| | Свойства эмитента:
|
| | | Имя | kts_pers
|
|
|
| | Свойства субъекта:
|
| | | Имя | kts_pers
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / kts19 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 10 31 0E 30 0C 06 03 55 04 03 13 05 6B 74 73 31 39
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | 17EC8952B20EC78F5AD949A818CDA098
|
| | | SHA1 Hash | 89B38C9E0A250487D441EEE38C57B2186461D6D5
|
|
|
| | Свойства эмитента:
|
| | | Имя | kts19
|
|
|
| | Свойства субъекта:
|
| | | Имя | kts19
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / pure_pers ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 1D 31 1B 30 19 06 03 55 04 03 1E 12 00 70 00 75 00 72 00 65 00 5F 00 70 00 65 00 72 00 73
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | 29472E7B2D34AEBE7082FA3028979106
|
| | | SHA1 Hash | A7F177134F6122B267DE0D880BDD40ED5D03B4BE
|
|
|
| | Свойства эмитента:
|
| | | Имя | pure_pers
|
|
|
| | Свойства субъекта:
|
| | | Имя | pure_pers
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
|
|
| [ Software Publisher Certificates / pure19 ]
|
|
|
| | Свойства сертификата:
|
| | | Версия | V3
|
| | | Алгоритм подписи | 1.3.14.3.2.29
|
| | | Серийный номер | 30 11 31 0F 30 0D 06 03 55 04 03 13 06 70 75 72 65 31 39
|
| | | Срок действия | 26.12.2018 - 26.12.2018
|
| | | MD5 Hash | C3DACEFE1B3BF7938CAC506930A2FF57
|
| | | SHA1 Hash | 5EF35FB254A6EF165157190CBD2D185B2E2442BC
|
|
|
| | Свойства эмитента:
|
| | | Имя | pure19
|
|
|
| | Свойства субъекта:
|
| | | Имя | pure19
|
|
|
| | Свойства публичного ключа:
|
| | | Алгоритм публичного ключа | RSA (1.2.840.113549.1.1.1)
|
| | | | |
|
| | Свойства OpenGL:
|
| | | Производитель | Intel
|
| | | Renderer | Intel(R) HD Graphics 4600
|
| | | Версия | 4.3.0 - Build 10.18.10.4013
|
| | | Версия языка затенения | 4.30 - Build 10.18.10.4013
|
| | | OpenGL DLL | 6.1.7601.23403(win7sp1_ldr.160325-0600)
|
| | | Multitexture Texture Units | 8
|
| | | Occlusion Query Counter Bits | 64
|
| | | Sub-Pixel Precision | 8 бит
|
| | | Max Viewport Size | 16384 x 16384
|
| | | Max Cube Map Texture Size | 16384 x 16384
|
| | | Max Rectangle Texture Size | 16384 x 16384
|
| | | Max 3D Texture Size | 2048 x 2048 x 2048
|
| | | Max Anisotropy | 16
|
| | | Max Clipping Planes | 8
|
| | | Max Display-List Nesting Level | 64
|
| | | Max Draw Buffers | 8
|
| | | Max Evaluator Order | 32
|
| | | Max Light Sources | 8
|
| | | Max Pixel Map Table Size | 65536
|
| | | Min / Max Program Texel Offset | -8 / 7
|
| | | Max Texture Array Layers | 2048
|
| | | Max Texture LOD Bias | 15
|
|
|
| | Соответствие OpenGL:
|
| | | OpenGL 1.1 | Да (100%)
|
| | | OpenGL 1.2 | Да (100%)
|
| | | OpenGL 1.3 | Да (100%)
|
| | | OpenGL 1.4 | Да (100%)
|
| | | OpenGL 1.5 | Да (100%)
|
| | | OpenGL 2.0 | Да (100%)
|
| | | OpenGL 2.1 | Да (100%)
|
| | | OpenGL 3.0 | Да (100%)
|
| | | OpenGL 3.1 | Да (100%)
|
| | | OpenGL 3.2 | Да (100%)
|
| | | OpenGL 3.3 | Да (100%)
|
| | | OpenGL 4.0 | Да (100%)
|
| | | OpenGL 4.1 | Да (100%)
|
| | | OpenGL 4.2 | Да (100%)
|
| | | OpenGL 4.3 | Да (100%)
|
| | | OpenGL 4.4 | Нет (44%)
|
| | | OpenGL 4.5 | Нет (0%)
|
| | | OpenGL 4.6 | Нет (0%)
|
|
|
| | Max Stack Depth:
|
| | | Attribute Stack | 16
|
| | | Client Attribute Stack | 16
|
| | | Modelview Matrix Stack | 32
|
| | | Name Stack | 128
|
| | | Projection Matrix Stack | 4
|
| | | Texture Matrix Stack | 10
|
|
|
| | Draw Range Elements:
|
| | | Max Index Count | 1048576
|
| | | Max Vertex Count | 1048576
|
|
|
| | Transform Feedback:
|
| | | Max Interleaved Components | 128
|
| | | Max Separate Attributes | 4
|
| | | Max Separate Components | 4
|
|
|
| | Framebuffer Object:
|
| | | Max Color Attachments | 8
|
| | | Max Render Buffer Size | 16384 x 16384
|
|
|
| | Vertex Shader:
|
| | | Max Uniform Vertex Components | 4096
|
| | | Max Varying Floats | 64
|
| | | Max Vertex Texture Image Units | 32
|
| | | Max Combined Texture Image Units | 192
|
|
|
| | Geometry Shader:
|
| | | Max Geometry Texture Units | 32
|
| | | Max Varying Components | 64
|
| | | Max Geometry Varying Components | 64
|
| | | Max Vertex Varying Components | 32
|
| | | Max Geometry Uniform Components | 4096
|
| | | Max Geometry Output Vertices | 256
|
| | | Max Geometry Total Output Components | 1024
|
|
|
| | Fragment Shader:
|
| | | Max Uniform Fragment Components | 4096
|
|
|
| | Vertex Program:
|
| | | Max Local Parameters | 256
|
| | | Max Environment Parameters | 300
|
| | | Max Program Matrices | 8
|
| | | Max Program Matrix Stack Depth | 2
|
| | | Max Vertex Attributes | 16
|
| | | Max Instructions | 1024
|
| | | Max Native Instructions | 1024
|
| | | Max Temporaries | 31
|
| | | Max Native Temporaries | 31
|
| | | Max Parameters | 512
|
| | | Max Native Parameters | 400
|
| | | Max Attributes | 16
|
| | | Max Native Attributes | 16
|
| | | Max Address Registers | 1
|
| | | Max Native Address Registers | 1
|
|
|
| | Fragment Program:
|
| | | Max Local Parameters | 256
|
| | | Max Environment Parameters | 256
|
| | | Max Texture Coordinates | 8
|
| | | Max Texture Image Units | 32
|
| | | Max Instructions | 1447
|
| | | Max Native Instructions | 1447
|
| | | Max Temporaries | 256
|
| | | Max Native Temporaries | 256
|
| | | Max Parameters | 512
|
| | | Max Native Parameters | 32
|
| | | Max Attributes | 13
|
| | | Max Native Attributes | 13
|
| | | Max Address Registers | 0
|
| | | Max Native Address Registers | 0
|
| | | Max ALU Instructions | 1447
|
| | | Max Native ALU Instructions | 1447
|
| | | Max Texture Instructions | 1447
|
| | | Max Native Texture Instructions | 1447
|
| | | Max Texture Indirections | 128
|
| | | Max Native Texture Indirections | 128
|
|
|
| | Расширения OpenGL:
|
| | | Всего / поддерживаемых расширений | 1054 / 209
|
| | | GL_3DFX_multisample | Не поддерживается
|
| | | GL_3DFX_tbuffer | Не поддерживается
|
| | | GL_3DFX_texture_compression_FXT1 | Поддерживается
|
| | | GL_3DL_direct_texture_access2 | Не поддерживается
|
| | | GL_3Dlabs_multisample_transparency_id | Не поддерживается
|
| | | GL_3Dlabs_multisample_transparency_range | Не поддерживается
|
| | | GL_AMD_blend_minmax_factor | Не поддерживается
|
| | | GL_AMD_compressed_3DC_texture | Не поддерживается
|
| | | GL_AMD_compressed_ATC_texture | Не поддерживается
|
| | | GL_AMD_conservative_depth | Не поддерживается
|
| | | GL_AMD_debug_output | Не поддерживается
|
| | | GL_AMD_depth_clamp_separate | Не поддерживается
|
| | | GL_AMD_draw_buffers_blend | Не поддерживается
|
| | | GL_AMD_framebuffer_sample_positions | Не поддерживается
|
| | | GL_AMD_gcn_shader | Не поддерживается
|
| | | GL_AMD_gpu_shader_half_float | Не поддерживается
|
| | | GL_AMD_gpu_shader_half_float2 | Не поддерживается
|
| | | GL_AMD_gpu_shader_int64 | Не поддерживается
|
| | | GL_AMD_interleaved_elements | Не поддерживается
|
| | | GL_AMD_multi_draw_indirect | Не поддерживается
|
| | | GL_AMD_name_gen_delete | Не поддерживается
|
| | | GL_AMD_occlusion_query_event | Не поддерживается
|
| | | GL_AMD_performance_monitor | Не поддерживается
|
| | | GL_AMD_pinned_memory | Не поддерживается
|
| | | GL_AMD_program_binary_Z400 | Не поддерживается
|
| | | GL_AMD_query_buffer_object | Не поддерживается
|
| | | GL_AMD_sample_positions | Не поддерживается
|
| | | GL_AMD_seamless_cubemap_per_texture | Не поддерживается
|
| | | GL_AMD_shader_atomic_counter_ops | Не поддерживается
|
| | | GL_AMD_shader_stencil_export | Не поддерживается
|
| | | GL_AMD_shader_stencil_value_export | Не поддерживается
|
| | | GL_AMD_shader_trace | Не поддерживается
|
| | | GL_AMD_shader_trinary_minmax | Не поддерживается
|
| | | GL_AMD_sparse_texture | Не поддерживается
|
| | | GL_AMD_sparse_texture_pool | Не поддерживается
|
| | | GL_AMD_stencil_operation_extended | Не поддерживается
|
| | | GL_AMD_texture_compression_dxt6 | Не поддерживается
|
| | | GL_AMD_texture_compression_dxt7 | Не поддерживается
|
| | | GL_AMD_texture_cube_map_array | Не поддерживается
|
| | | GL_AMD_texture_texture4 | Не поддерживается
|
| | | GL_AMD_texture_tile_pool | Не поддерживается
|
| | | GL_AMD_transform_feedback3_lines_triangles | Не поддерживается
|
| | | GL_AMD_transform_feedback4 | Не поддерживается
|
| | | GL_AMD_vertex_shader_layer | Поддерживается
|
| | | GL_AMD_vertex_shader_tessellator | Не поддерживается
|
| | | GL_AMD_vertex_shader_viewport_index | Поддерживается
|
| | | GL_AMDX_debug_output | Не поддерживается
|
| | | GL_AMDX_name_gen_delete | Не поддерживается
|
| | | GL_AMDX_random_access_target | Не поддерживается
|
| | | GL_AMDX_vertex_shader_tessellator | Не поддерживается
|
| | | GL_ANDROID_extension_pack_es31a | Не поддерживается
|
| | | GL_ANGLE_depth_texture | Не поддерживается
|
| | | GL_ANGLE_framebuffer_blit | Не поддерживается
|
| | | GL_ANGLE_framebuffer_multisample | Не поддерживается
|
| | | GL_ANGLE_instanced_arrays | Не поддерживается
|
| | | GL_ANGLE_pack_reverse_row_order | Не поддерживается
|
| | | GL_ANGLE_program_binary | Не поддерживается
|
| | | GL_ANGLE_texture_compression_dxt1 | Не поддерживается
|
| | | GL_ANGLE_texture_compression_dxt3 | Не поддерживается
|
| | | GL_ANGLE_texture_compression_dxt5 | Не поддерживается
|
| | | GL_ANGLE_texture_usage | Не поддерживается
|
| | | GL_ANGLE_translated_shader_source | Не поддерживается
|
| | | GL_APPLE_aux_depth_stencil | Не поддерживается
|
| | | GL_APPLE_client_storage | Не поддерживается
|
| | | GL_APPLE_copy_texture_levels | Не поддерживается
|
| | | GL_APPLE_element_array | Не поддерживается
|
| | | GL_APPLE_fence | Не поддерживается
|
| | | GL_APPLE_float_pixels | Не поддерживается
|
| | | GL_APPLE_flush_buffer_range | Не поддерживается
|
| | | GL_APPLE_flush_render | Не поддерживается
|
| | | GL_APPLE_framebuffer_multisample | Не поддерживается
|
| | | GL_APPLE_object_purgeable | Не поддерживается
|
| | | GL_APPLE_packed_pixel | Не поддерживается
|
| | | GL_APPLE_packed_pixels | Не поддерживается
|
| | | GL_APPLE_pixel_buffer | Не поддерживается
|
| | | GL_APPLE_rgb_422 | Не поддерживается
|
| | | GL_APPLE_row_bytes | Не поддерживается
|
| | | GL_APPLE_specular_vector | Не поддерживается
|
| | | GL_APPLE_sync | Не поддерживается
|
| | | GL_APPLE_texture_2D_limited_npot | Не поддерживается
|
| | | GL_APPLE_texture_format_BGRA8888 | Не поддерживается
|
| | | GL_APPLE_texture_max_level | Не поддерживается
|
| | | GL_APPLE_texture_range | Не поддерживается
|
| | | GL_APPLE_transform_hint | Не поддерживается
|
| | | GL_APPLE_vertex_array_object | Не поддерживается
|
| | | GL_APPLE_vertex_array_range | Не поддерживается
|
| | | GL_APPLE_vertex_point_size | Не поддерживается
|
| | | GL_APPLE_vertex_program_evaluators | Не поддерживается
|
| | | GL_APPLE_ycbcr_422 | Не поддерживается
|
| | | GL_ARB_arrays_of_arrays | Поддерживается
|
| | | GL_ARB_base_instance | Поддерживается
|
| | | GL_ARB_bindless_texture | Не поддерживается
|
| | | GL_ARB_blend_func_extended | Поддерживается
|
| | | GL_ARB_buffer_storage | Поддерживается
|
| | | GL_ARB_cl_event | Поддерживается
|
| | | GL_ARB_clear_buffer_object | Поддерживается
|
| | | GL_ARB_clear_texture | Не поддерживается
|
| | | GL_ARB_clip_control | Не поддерживается
|
| | | GL_ARB_color_buffer_float | Поддерживается
|
| | | GL_ARB_compatibility | Поддерживается
|
| | | GL_ARB_compressed_texture_pixel_storage | Поддерживается
|
| | | GL_ARB_compute_shader | Поддерживается
|
| | | GL_ARB_compute_variable_group_size | Не поддерживается
|
| | | GL_ARB_conditional_render_inverted | Не поддерживается
|
| | | GL_ARB_conservative_depth | Поддерживается
|
| | | GL_ARB_context_flush_control | Не поддерживается
|
| | | GL_ARB_copy_buffer | Поддерживается
|
| | | GL_ARB_copy_image | Поддерживается
|
| | | GL_ARB_cull_distance | Не поддерживается
|
| | | GL_ARB_debug_group | Не поддерживается
|
| | | GL_ARB_debug_label | Не поддерживается
|
| | | GL_ARB_debug_output | Поддерживается
|
| | | GL_ARB_debug_output2 | Не поддерживается
|
| | | GL_ARB_depth_buffer_float | Поддерживается
|
| | | GL_ARB_depth_clamp | Поддерживается
|
| | | GL_ARB_depth_texture | Поддерживается
|
| | | GL_ARB_derivative_control | Не поддерживается
|
| | | GL_ARB_direct_state_access | Не поддерживается
|
| | | GL_ARB_draw_buffers | Поддерживается
|
| | | GL_ARB_draw_buffers_blend | Поддерживается
|
| | | GL_ARB_draw_elements_base_vertex | Поддерживается
|
| | | GL_ARB_draw_indirect | Поддерживается
|
| | | GL_ARB_draw_instanced | Поддерживается
|
| | | GL_ARB_enhanced_layouts | Не поддерживается
|
| | | GL_ARB_ES2_compatibility | Поддерживается
|
| | | GL_ARB_ES3_1_compatibility | Не поддерживается
|
| | | GL_ARB_ES3_2_compatibility | Не поддерживается
|
| | | GL_ARB_ES3_compatibility | Поддерживается
|
| | | GL_ARB_explicit_attrib_location | Поддерживается
|
| | | GL_ARB_explicit_uniform_location | Поддерживается
|
| | | GL_ARB_fragment_coord_conventions | Поддерживается
|
| | | GL_ARB_fragment_layer_viewport | Поддерживается
|
| | | GL_ARB_fragment_program | Поддерживается
|
| | | GL_ARB_fragment_program_shadow | Поддерживается
|
| | | GL_ARB_fragment_shader | Поддерживается
|
| | | GL_ARB_fragment_shader_interlock | Не поддерживается
|
| | | GL_ARB_framebuffer_no_attachments | Поддерживается
|
| | | GL_ARB_framebuffer_object | Поддерживается
|
| | | GL_ARB_framebuffer_sRGB | Поддерживается
|
| | | GL_ARB_geometry_shader4 | Поддерживается
|
| | | GL_ARB_get_program_binary | Поддерживается
|
| | | GL_ARB_get_texture_sub_image | Не поддерживается
|
| | | GL_ARB_gl_spirv | Не поддерживается
|
| | | GL_ARB_gpu_shader_fp64 | Поддерживается
|
| | | GL_ARB_gpu_shader_int64 | Не поддерживается
|
| | | GL_ARB_gpu_shader5 | Поддерживается
|
| | | GL_ARB_half_float_pixel | Поддерживается
|
| | | GL_ARB_half_float_vertex | Поддерживается
|
| | | GL_ARB_imaging | Не поддерживается
|
| | | GL_ARB_indirect_parameters | Не поддерживается
|
| | | GL_ARB_instanced_arrays | Поддерживается
|
| | | GL_ARB_internalformat_query | Поддерживается
|
| | | GL_ARB_internalformat_query2 | Поддерживается
|
| | | GL_ARB_invalidate_subdata | Поддерживается
|
| | | GL_ARB_make_current_read | Не поддерживается
|
| | | GL_ARB_map_buffer_alignment | Поддерживается
|
| | | GL_ARB_map_buffer_range | Поддерживается
|
| | | GL_ARB_matrix_palette | Не поддерживается
|
| | | GL_ARB_multi_bind | Не поддерживается
|
| | | GL_ARB_multi_draw_indirect | Поддерживается
|
| | | GL_ARB_multisample | Поддерживается
|
| | | GL_ARB_multitexture | Поддерживается
|
| | | GL_ARB_occlusion_query | Поддерживается
|
| | | GL_ARB_occlusion_query2 | Поддерживается
|
| | | GL_ARB_parallel_shader_compile | Не поддерживается
|
| | | GL_ARB_pipeline_statistics_query | Не поддерживается
|
| | | GL_ARB_pixel_buffer_object | Поддерживается
|
| | | GL_ARB_point_parameters | Поддерживается
|
| | | GL_ARB_point_sprite | Поддерживается
|
| | | GL_ARB_polygon_offset_clamp | Не поддерживается
|
| | | GL_ARB_post_depth_coverage | Не поддерживается
|
| | | GL_ARB_program_interface_query | Поддерживается
|
| | | GL_ARB_provoking_vertex | Поддерживается
|
| | | GL_ARB_query_buffer_object | Поддерживается
|
| | | GL_ARB_robust_buffer_access_behavior | Поддерживается
|
| | | GL_ARB_robustness | Поддерживается
|
| | | GL_ARB_robustness_isolation | Не поддерживается
|
| | | GL_ARB_sample_locations | Не поддерживается
|
| | | GL_ARB_sample_shading | Поддерживается
|
| | | GL_ARB_sampler_objects | Поддерживается
|
| | | GL_ARB_seamless_cube_map | Поддерживается
|
| | | GL_ARB_seamless_cubemap_per_texture | Не поддерживается
|
| | | GL_ARB_separate_shader_objects | Поддерживается
|
| | | GL_ARB_shader_atomic_counter_ops | Не поддерживается
|
| | | GL_ARB_shader_atomic_counters | Поддерживается
|
| | | GL_ARB_shader_ballot | Не поддерживается
|
| | | GL_ARB_shader_bit_encoding | Поддерживается
|
| | | GL_ARB_shader_clock | Не поддерживается
|
| | | GL_ARB_shader_draw_parameters | Не поддерживается
|
| | | GL_ARB_shader_group_vote | Не поддерживается
|
| | | GL_ARB_shader_image_load_store | Поддерживается
|
| | | GL_ARB_shader_image_size | Поддерживается
|
| | | GL_ARB_shader_objects | Поддерживается
|
| | | GL_ARB_shader_precision | Поддерживается
|
| | | GL_ARB_shader_stencil_export | Не поддерживается
|
| | | GL_ARB_shader_storage_buffer_object | Поддерживается
|
| | | GL_ARB_shader_subroutine | Поддерживается
|
| | | GL_ARB_shader_texture_image_samples | Не поддерживается
|
| | | GL_ARB_shader_texture_lod | Не поддерживается
|
| | | GL_ARB_shader_viewport_layer_array | Не поддерживается
|
| | | GL_ARB_shading_language_100 | Поддерживается
|
| | | GL_ARB_shading_language_120 | Не поддерживается
|
| | | GL_ARB_shading_language_420pack | Поддерживается
|
| | | GL_ARB_shading_language_include | Не поддерживается
|
| | | GL_ARB_shading_language_packing | Поддерживается
|
| | | GL_ARB_shadow | Поддерживается
|
| | | GL_ARB_shadow_ambient | Не поддерживается
|
| | | GL_ARB_sparse_buffer | Не поддерживается
|
| | | GL_ARB_sparse_texture | Не поддерживается
|
| | | GL_ARB_sparse_texture_clamp | Не поддерживается
|
| | | GL_ARB_sparse_texture2 | Не поддерживается
|
| | | GL_ARB_spirv_extensions | Не поддерживается
|
| | | GL_ARB_stencil_texturing | Поддерживается
|
| | | GL_ARB_swap_buffers | Не поддерживается
|
| | | GL_ARB_sync | Поддерживается
|
| | | GL_ARB_tessellation_shader | Поддерживается
|
| | | GL_ARB_texture_barrier | Не поддерживается
|
| | | GL_ARB_texture_border_clamp | Поддерживается
|
| | | GL_ARB_texture_buffer_object | Не поддерживается
|
| | | GL_ARB_texture_buffer_object_rgb32 | Поддерживается
|
| | | GL_ARB_texture_buffer_range | Поддерживается
|
| | | GL_ARB_texture_compression | Поддерживается
|
| | | GL_ARB_texture_compression_bptc | Поддерживается
|
| | | GL_ARB_texture_compression_rgtc | Поддерживается
|
| | | GL_ARB_texture_compression_rtgc | Не поддерживается
|
| | | GL_ARB_texture_cube_map | Поддерживается
|
| | | GL_ARB_texture_cube_map_array | Поддерживается
|
| | | GL_ARB_texture_env_add | Поддерживается
|
| | | GL_ARB_texture_env_combine | Поддерживается
|
| | | GL_ARB_texture_env_crossbar | Поддерживается
|
| | | GL_ARB_texture_env_dot3 | Поддерживается
|
| | | GL_ARB_texture_filter_anisotropic | Не поддерживается
|
| | | GL_ARB_texture_filter_minmax | Не поддерживается
|
| | | GL_ARB_texture_float | Поддерживается
|
| | | GL_ARB_texture_gather | Поддерживается
|
| | | GL_ARB_texture_mirror_clamp_to_edge | Поддерживается
|
| | | GL_ARB_texture_mirrored_repeat | Не поддерживается
|
| | | GL_ARB_texture_multisample | Поддерживается
|
| | | GL_ARB_texture_non_power_of_two | Поддерживается
|
| | | GL_ARB_texture_query_levels | Поддерживается
|
| | | GL_ARB_texture_query_lod | Поддерживается
|
| | | GL_ARB_texture_rectangle | Поддерживается
|
| | | GL_ARB_texture_rg | Поддерживается
|
| | | GL_ARB_texture_rgb10_a2ui | Поддерживается
|
| | | GL_ARB_texture_snorm | Не поддерживается
|
| | | GL_ARB_texture_stencil8 | Поддерживается
|
| | | GL_ARB_texture_storage | Поддерживается
|
| | | GL_ARB_texture_storage_multisample | Поддерживается
|
| | | GL_ARB_texture_swizzle | Поддерживается
|
| | | GL_ARB_texture_view | Поддерживается
|
| | | GL_ARB_timer_query | Поддерживается
|
| | | GL_ARB_transform_feedback_instanced | Поддерживается
|
| | | GL_ARB_transform_feedback_overflow_query | Не поддерживается
|
| | | GL_ARB_transform_feedback2 | Поддерживается
|
| | | GL_ARB_transform_feedback3 | Поддерживается
|
| | | GL_ARB_transpose_matrix | Поддерживается
|
| | | GL_ARB_uber_buffers | Не поддерживается
|
| | | GL_ARB_uber_mem_image | Не поддерживается
|
| | | GL_ARB_uber_vertex_array | Не поддерживается
|
| | | GL_ARB_uniform_buffer_object | Поддерживается
|
| | | GL_ARB_vertex_array_bgra | Поддерживается
|
| | | GL_ARB_vertex_array_object | Поддерживается
|
| | | GL_ARB_vertex_attrib_64bit | Поддерживается
|
| | | GL_ARB_vertex_attrib_binding | Поддерживается
|
| | | GL_ARB_vertex_blend | Не поддерживается
|
| | | GL_ARB_vertex_buffer_object | Поддерживается
|
| | | GL_ARB_vertex_program | Поддерживается
|
| | | GL_ARB_vertex_shader | Поддерживается
|
| | | GL_ARB_vertex_type_10f_11f_11f_rev | Не поддерживается
|
| | | GL_ARB_vertex_type_2_10_10_10_rev | Поддерживается
|
| | | GL_ARB_viewport_array | Поддерживается
|
| | | GL_ARB_window_pos | Поддерживается
|
| | | GL_ARM_mali_program_binary | Не поддерживается
|
| | | GL_ARM_mali_shader_binary | Не поддерживается
|
| | | GL_ARM_rgba8 | Не поддерживается
|
| | | GL_ARM_shader_framebuffer_fetch | Не поддерживается
|
| | | GL_ARM_shader_framebuffer_fetch_depth_stencil | Не поддерживается
|
| | | GL_ATI_array_rev_comps_in_4_bytes | Не поддерживается
|
| | | GL_ATI_blend_equation_separate | Не поддерживается
|
| | | GL_ATI_blend_weighted_minmax | Не поддерживается
|
| | | GL_ATI_draw_buffers | Не поддерживается
|
| | | GL_ATI_element_array | Не поддерживается
|
| | | GL_ATI_envmap_bumpmap | Не поддерживается
|
| | | GL_ATI_fragment_shader | Не поддерживается
|
| | | GL_ATI_lock_texture | Не поддерживается
|
| | | GL_ATI_map_object_buffer | Не поддерживается
|
| | | GL_ATI_meminfo | Не поддерживается
|
| | | GL_ATI_pixel_format_float | Не поддерживается
|
| | | GL_ATI_pn_triangles | Не поддерживается
|
| | | GL_ATI_point_cull_mode | Не поддерживается
|
| | | GL_ATI_separate_stencil | Поддерживается
|
| | | GL_ATI_shader_texture_lod | Не поддерживается
|
| | | GL_ATI_text_fragment_shader | Не поддерживается
|
| | | GL_ATI_texture_compression_3dc | Не поддерживается
|
| | | GL_ATI_texture_env_combine3 | Не поддерживается
|
| | | GL_ATI_texture_float | Не поддерживается
|
| | | GL_ATI_texture_mirror_once | Не поддерживается
|
| | | GL_ATI_vertex_array_object | Не поддерживается
|
| | | GL_ATI_vertex_attrib_array_object | Не поддерживается
|
| | | GL_ATI_vertex_blend | Не поддерживается
|
| | | GL_ATI_vertex_shader | Не поддерживается
|
| | | GL_ATI_vertex_streams | Не поддерживается
|
| | | GL_ATIX_pn_triangles | Не поддерживается
|
| | | GL_ATIX_texture_env_combine3 | Не поддерживается
|
| | | GL_ATIX_texture_env_route | Не поддерживается
|
| | | GL_ATIX_vertex_shader_output_point_size | Не поддерживается
|
| | | GL_Autodesk_facet_normal | Не поддерживается
|
| | | GL_Autodesk_valid_back_buffer_hint | Не поддерживается
|
| | | GL_CR_bounding_box | Не поддерживается
|
| | | GL_CR_cursor_position | Не поддерживается
|
| | | GL_CR_head_spu_name | Не поддерживается
|
| | | GL_CR_performance_info | Не поддерживается
|
| | | GL_CR_print_string | Не поддерживается
|
| | | GL_CR_readback_barrier_size | Не поддерживается
|
| | | GL_CR_saveframe | Не поддерживается
|
| | | GL_CR_server_id_sharing | Не поддерживается
|
| | | GL_CR_server_matrix | Не поддерживается
|
| | | GL_CR_state_parameter | Не поддерживается
|
| | | GL_CR_synchronization | Не поддерживается
|
| | | GL_CR_tile_info | Не поддерживается
|
| | | GL_CR_tilesort_info | Не поддерживается
|
| | | GL_CR_window_size | Не поддерживается
|
| | | GL_DIMD_YUV | Не поддерживается
|
| | | GL_DMP_shader_binary | Не поддерживается
|
| | | GL_EXT_422_pixels | Не поддерживается
|
| | | GL_EXT_abgr | Поддерживается
|
| | | GL_EXT_bgra | Поддерживается
|
| | | GL_EXT_bindable_uniform | Не поддерживается
|
| | | GL_EXT_blend_color | Поддерживается
|
| | | GL_EXT_blend_equation_separate | Поддерживается
|
| | | GL_EXT_blend_func_separate | Поддерживается
|
| | | GL_EXT_blend_logic_op | Не поддерживается
|
| | | GL_EXT_blend_minmax | Поддерживается
|
| | | GL_EXT_blend_subtract | Поддерживается
|
| | | GL_EXT_Cg_shader | Не поддерживается
|
| | | GL_EXT_clip_control | Поддерживается
|
| | | GL_EXT_clip_volume_hint | Поддерживается
|
| | | GL_EXT_cmyka | Не поддерживается
|
| | | GL_EXT_color_buffer_float | Не поддерживается
|
| | | GL_EXT_color_buffer_half_float | Не поддерживается
|
| | | GL_EXT_color_matrix | Не поддерживается
|
| | | GL_EXT_color_subtable | Не поддерживается
|
| | | GL_EXT_color_table | Не поддерживается
|
| | | GL_EXT_compiled_vertex_array | Поддерживается
|
| | | GL_EXT_convolution | Не поддерживается
|
| | | GL_EXT_convolution_border_modes | Не поддерживается
|
| | | GL_EXT_coordinate_frame | Не поддерживается
|
| | | GL_EXT_copy_buffer | Не поддерживается
|
| | | GL_EXT_copy_image | Не поддерживается
|
| | | GL_EXT_copy_texture | Не поддерживается
|
| | | GL_EXT_cull_vertex | Не поддерживается
|
| | | GL_EXT_debug_label | Не поддерживается
|
| | | GL_EXT_debug_marker | Не поддерживается
|
| | | GL_EXT_depth_bounds_test | Не поддерживается
|
| | | GL_EXT_depth_buffer_float | Не поддерживается
|
| | | GL_EXT_direct_state_access | Поддерживается
|
| | | GL_EXT_discard_framebuffer | Не поддерживается
|
| | | GL_EXT_disjoint_timer_query | Не поддерживается
|
| | | GL_EXT_draw_buffers | Не поддерживается
|
| | | GL_EXT_draw_buffers_indexed | Не поддерживается
|
| | | GL_EXT_draw_buffers2 | Поддерживается
|
| | | GL_EXT_draw_indirect | Не поддерживается
|
| | | GL_EXT_draw_instanced | Не поддерживается
|
| | | GL_EXT_draw_range_elements | Поддерживается
|
| | | GL_EXT_fog_coord | Поддерживается
|
| | | GL_EXT_fog_function | Не поддерживается
|
| | | GL_EXT_fog_offset | Не поддерживается
|
| | | GL_EXT_frag_depth | Не поддерживается
|
| | | GL_EXT_fragment_lighting | Не поддерживается
|
| | | GL_EXT_framebuffer_blit | Поддерживается
|
| | | GL_EXT_framebuffer_multisample | Поддерживается
|
| | | GL_EXT_framebuffer_multisample_blit_scaled | Не поддерживается
|
| | | GL_EXT_framebuffer_object | Поддерживается
|
| | | GL_EXT_framebuffer_sRGB | Не поддерживается
|
| | | GL_EXT_generate_mipmap | Не поддерживается
|
| | | GL_EXT_geometry_point_size | Не поддерживается
|
| | | GL_EXT_geometry_shader | Не поддерживается
|
| | | GL_EXT_geometry_shader4 | Поддерживается
|
| | | GL_EXT_glx_stereo_tree | Не поддерживается
|
| | | GL_EXT_gpu_program_parameters | Поддерживается
|
| | | GL_EXT_gpu_shader_fp64 | Не поддерживается
|
| | | GL_EXT_gpu_shader4 | Поддерживается
|
| | | GL_EXT_gpu_shader5 | Не поддерживается
|
| | | GL_EXT_histogram | Не поддерживается
|
| | | GL_EXT_import_sync_object | Не поддерживается
|
| | | GL_EXT_index_array_formats | Не поддерживается
|
| | | GL_EXT_index_func | Не поддерживается
|
| | | GL_EXT_index_material | Не поддерживается
|
| | | GL_EXT_index_texture | Не поддерживается
|
| | | GL_EXT_instanced_arrays | Не поддерживается
|
| | | GL_EXT_interlace | Не поддерживается
|
| | | GL_EXT_light_texture | Не поддерживается
|
| | | GL_EXT_map_buffer_range | Не поддерживается
|
| | | GL_EXT_memory_object | Не поддерживается
|
| | | GL_EXT_memory_object_win32 | Не поддерживается
|
| | | GL_EXT_misc_attribute | Не поддерживается
|
| | | GL_EXT_multi_draw_arrays | Поддерживается
|
| | | GL_EXT_multisample | Не поддерживается
|
| | | GL_EXT_multisampled_render_to_texture | Не поддерживается
|
| | | GL_EXT_multiview_draw_buffers | Не поддерживается
|
| | | GL_EXT_occlusion_query_boolean | Не поддерживается
|
| | | GL_EXT_packed_depth_stencil | Поддерживается
|
| | | GL_EXT_packed_float | Поддерживается
|
| | | GL_EXT_packed_pixels | Поддерживается
|
| | | GL_EXT_packed_pixels_12 | Не поддерживается
|
| | | GL_EXT_paletted_texture | Не поддерживается
|
| | | GL_EXT_pixel_buffer_object | Не поддерживается
|
| | | GL_EXT_pixel_format | Не поддерживается
|
| | | GL_EXT_pixel_texture | Не поддерживается
|
| | | GL_EXT_pixel_transform | Не поддерживается
|
| | | GL_EXT_pixel_transform_color_table | Не поддерживается
|
| | | GL_EXT_point_parameters | Не поддерживается
|
| | | GL_EXT_polygon_offset | Не поддерживается
|
| | | GL_EXT_polygon_offset_clamp | Поддерживается
|
| | | GL_EXT_post_depth_coverage | Не поддерживается
|
| | | GL_EXT_primitive_bounding_box | Не поддерживается
|
| | | GL_EXT_provoking_vertex | Не поддерживается
|
| | | GL_EXT_pvrtc_sRGB | Не поддерживается
|
| | | GL_EXT_raster_multisample | Не поддерживается
|
| | | GL_EXT_read_format_bgra | Не поддерживается
|
| | | GL_EXT_rescale_normal | Поддерживается
|
| | | GL_EXT_robustness | Не поддерживается
|
| | | GL_EXT_scene_marker | Не поддерживается
|
| | | GL_EXT_secondary_color | Поддерживается
|
| | | GL_EXT_semaphore | Не поддерживается
|
| | | GL_EXT_semaphore_win32 | Не поддерживается
|
| | | GL_EXT_separate_shader_objects | Не поддерживается
|
| | | GL_EXT_separate_specular_color | Поддерживается
|
| | | GL_EXT_shader_atomic_counters | Не поддерживается
|
| | | GL_EXT_shader_framebuffer_fetch | Не поддерживается
|
| | | GL_EXT_shader_image_load_formatted | Не поддерживается
|
| | | GL_EXT_shader_image_load_store | Поддерживается
|
| | | GL_EXT_shader_implicit_conversions | Не поддерживается
|
| | | GL_EXT_shader_integer_mix | Не поддерживается
|
| | | GL_EXT_shader_io_blocks | Не поддерживается
|
| | | GL_EXT_shader_pixel_local_storage | Не поддерживается
|
| | | GL_EXT_shader_subroutine | Не поддерживается
|
| | | GL_EXT_shader_texture_lod | Не поддерживается
|
| | | GL_EXT_shadow_funcs | Поддерживается
|
| | | GL_EXT_shadow_samplers | Не поддерживается
|
| | | GL_EXT_shared_texture_palette | Не поддерживается
|
| | | GL_EXT_sparse_texture2 | Не поддерживается
|
| | | GL_EXT_sRGB | Не поддерживается
|
| | | GL_EXT_sRGB_write_control | Не поддерживается
|
| | | GL_EXT_static_vertex_array | Не поддерживается
|
| | | GL_EXT_stencil_clear_tag | Не поддерживается
|
| | | GL_EXT_stencil_two_side | Поддерживается
|
| | | GL_EXT_stencil_wrap | Поддерживается
|
| | | GL_EXT_subtexture | Не поддерживается
|
| | | GL_EXT_swap_control | Не поддерживается
|
| | | GL_EXT_tessellation_point_size | Не поддерживается
|
| | | GL_EXT_tessellation_shader | Не поддерживается
|
| | | GL_EXT_texgen_reflection | Не поддерживается
|
| | | GL_EXT_texture | Не поддерживается
|
| | | GL_EXT_texture_array | Поддерживается
|
| | | GL_EXT_texture_border_clamp | Не поддерживается
|
| | | GL_EXT_texture_buffer | Не поддерживается
|
| | | GL_EXT_texture_buffer_object | Не поддерживается
|
| | | GL_EXT_texture_buffer_object_rgb32 | Не поддерживается
|
| | | GL_EXT_texture_color_table | Не поддерживается
|
| | | GL_EXT_texture_compression_bptc | Не поддерживается
|
| | | GL_EXT_texture_compression_dxt1 | Не поддерживается
|
| | | GL_EXT_texture_compression_latc | Не поддерживается
|
| | | GL_EXT_texture_compression_rgtc | Не поддерживается
|
| | | GL_EXT_texture_compression_s3tc | Поддерживается
|
| | | GL_EXT_texture_cube_map | Не поддерживается
|
| | | GL_EXT_texture_cube_map_array | Не поддерживается
|
| | | GL_EXT_texture_edge_clamp | Поддерживается
|
| | | GL_EXT_texture_env | Не поддерживается
|
| | | GL_EXT_texture_env_add | Поддерживается
|
| | | GL_EXT_texture_env_combine | Поддерживается
|
| | | GL_EXT_texture_env_dot3 | Не поддерживается
|
| | | GL_EXT_texture_filter_anisotropic | Поддерживается
|
| | | GL_EXT_texture_filter_minmax | Не поддерживается
|
| | | GL_EXT_texture_format_BGRA8888 | Не поддерживается
|
| | | GL_EXT_texture_integer | Поддерживается
|
| | | GL_EXT_texture_lod | Не поддерживается
|
| | | GL_EXT_texture_lod_bias | Поддерживается
|
| | | GL_EXT_texture_mirror_clamp | Не поддерживается
|
| | | GL_EXT_texture_object | Не поддерживается
|
| | | GL_EXT_texture_perturb_normal | Не поддерживается
|
| | | GL_EXT_texture_rectangle | Поддерживается
|
| | | GL_EXT_texture_rg | Не поддерживается
|
| | | GL_EXT_texture_shared_exponent | Поддерживается
|
| | | GL_EXT_texture_snorm | Поддерживается
|
| | | GL_EXT_texture_sRGB | Поддерживается
|
| | | GL_EXT_texture_sRGB_decode | Поддерживается
|
| | | GL_EXT_texture_storage | Поддерживается
|
| | | GL_EXT_texture_swizzle | Поддерживается
|
| | | GL_EXT_texture_type_2_10_10_10_REV | Не поддерживается
|
| | | GL_EXT_texture_view | Не поддерживается
|
| | | GL_EXT_texture3D | Поддерживается
|
| | | GL_EXT_texture4D | Не поддерживается
|
| | | GL_EXT_timer_query | Не поддерживается
|
| | | GL_EXT_transform_feedback | Поддерживается
|
| | | GL_EXT_transform_feedback2 | Не поддерживается
|
| | | GL_EXT_transform_feedback3 | Не поддерживается
|
| | | GL_EXT_unpack_subimage | Не поддерживается
|
| | | GL_EXT_vertex_array | Не поддерживается
|
| | | GL_EXT_vertex_array_bgra | Не поддерживается
|
| | | GL_EXT_vertex_array_set | Не поддерживается
|
| | | GL_EXT_vertex_array_setXXX | Не поддерживается
|
| | | GL_EXT_vertex_attrib_64bit | Не поддерживается
|
| | | GL_EXT_vertex_shader | Не поддерживается
|
| | | GL_EXT_vertex_weighting | Не поддерживается
|
| | | GL_EXT_win32_keyed_mutex | Не поддерживается
|
| | | GL_EXT_window_rectangles | Не поддерживается
|
| | | GL_EXT_x11_sync_object | Не поддерживается
|
| | | GL_EXTX_framebuffer_mixed_formats | Не поддерживается
|
| | | GL_EXTX_packed_depth_stencil | Не поддерживается
|
| | | GL_FGL_lock_texture | Не поддерживается
|
| | | GL_FJ_shader_binary_GCCSO | Не поддерживается
|
| | | GL_GL2_geometry_shader | Не поддерживается
|
| | | GL_GREMEDY_frame_terminator | Не поддерживается
|
| | | GL_GREMEDY_string_marker | Не поддерживается
|
| | | GL_HP_convolution_border_modes | Не поддерживается
|
| | | GL_HP_image_transform | Не поддерживается
|
| | | GL_HP_occlusion_test | Не поддерживается
|
| | | GL_HP_texture_lighting | Не поддерживается
|
| | | GL_I3D_argb | Не поддерживается
|
| | | GL_I3D_color_clamp | Не поддерживается
|
| | | GL_I3D_interlace_read | Не поддерживается
|
| | | GL_IBM_clip_check | Не поддерживается
|
| | | GL_IBM_cull_vertex | Не поддерживается
|
| | | GL_IBM_load_named_matrix | Не поддерживается
|
| | | GL_IBM_multi_draw_arrays | Не поддерживается
|
| | | GL_IBM_multimode_draw_arrays | Не поддерживается
|
| | | GL_IBM_occlusion_cull | Не поддерживается
|
| | | GL_IBM_pixel_filter_hint | Не поддерживается
|
| | | GL_IBM_rasterpos_clip | Не поддерживается
|
| | | GL_IBM_rescale_normal | Не поддерживается
|
| | | GL_IBM_static_data | Не поддерживается
|
| | | GL_IBM_texture_clamp_nodraw | Не поддерживается
|
| | | GL_IBM_texture_mirrored_repeat | Поддерживается
|
| | | GL_IBM_vertex_array_lists | Не поддерживается
|
| | | GL_IBM_YCbCr | Не поддерживается
|
| | | GL_IMG_multisampled_render_to_texture | Не поддерживается
|
| | | GL_IMG_program_binary | Не поддерживается
|
| | | GL_IMG_read_format | Не поддерживается
|
| | | GL_IMG_sgx_binary | Не поддерживается
|
| | | GL_IMG_shader_binary | Не поддерживается
|
| | | GL_IMG_texture_compression_pvrtc | Не поддерживается
|
| | | GL_IMG_texture_compression_pvrtc2 | Не поддерживается
|
| | | GL_IMG_texture_env_enhanced_fixed_function | Не поддерживается
|
| | | GL_IMG_texture_format_BGRA8888 | Не поддерживается
|
| | | GL_IMG_user_clip_plane | Не поддерживается
|
| | | GL_IMG_vertex_program | Не поддерживается
|
| | | GL_INGR_blend_func_separate | Не поддерживается
|
| | | GL_INGR_color_clamp | Не поддерживается
|
| | | GL_INGR_interlace_read | Не поддерживается
|
| | | GL_INGR_multiple_palette | Не поддерживается
|
| | | GL_INTEL_compute_shader_lane_shift | Не поддерживается
|
| | | GL_INTEL_conservative_rasterization | Не поддерживается
|
| | | GL_INTEL_fragment_shader_ordering | Поддерживается
|
| | | GL_INTEL_fragment_shader_span_sharing | Не поддерживается
|
| | | GL_INTEL_framebuffer_CMAA | Не поддерживается
|
| | | GL_INTEL_image_serialize | Не поддерживается
|
| | | GL_INTEL_map_texture | Поддерживается
|
| | | GL_INTEL_multi_rate_fragment_shader | Не поддерживается
|
| | | GL_INTEL_parallel_arrays | Не поддерживается
|
| | | GL_INTEL_performance_queries | Поддерживается
|
| | | GL_INTEL_performance_query | Поддерживается
|
| | | GL_INTEL_texture_scissor | Не поддерживается
|
| | | GL_KHR_blend_equation_advanced | Поддерживается
|
| | | GL_KHR_blend_equation_advanced_coherent | Не поддерживается
|
| | | GL_KHR_context_flush_control | Не поддерживается
|
| | | GL_KHR_debug | Поддерживается
|
| | | GL_KHR_no_error | Не поддерживается
|
| | | GL_KHR_parallel_shader_compile | Не поддерживается
|
| | | GL_KHR_robust_buffer_access_behavior | Не поддерживается
|
| | | GL_KHR_robustness | Не поддерживается
|
| | | GL_KHR_texture_compression_astc_hdr | Не поддерживается
|
| | | GL_KHR_texture_compression_astc_ldr | Не поддерживается
|
| | | GL_KHR_vulkan_glsl | Не поддерживается
|
| | | GL_KTX_buffer_region | Не поддерживается
|
| | | GL_MESA_pack_invert | Не поддерживается
|
| | | GL_MESA_program_debug | Не поддерживается
|
| | | GL_MESA_resize_buffers | Не поддерживается
|
| | | GL_MESA_texture_array | Не поддерживается
|
| | | GL_MESA_texture_signed_rgba | Не поддерживается
|
| | | GL_MESA_window_pos | Не поддерживается
|
| | | GL_MESA_ycbcr_texture | Не поддерживается
|
| | | GL_MESAX_texture_float | Не поддерживается
|
| | | GL_MESAX_texture_stack | Не поддерживается
|
| | | GL_MTX_fragment_shader | Не поддерживается
|
| | | GL_MTX_precision_dpi | Не поддерживается
|
| | | GL_NV_3dvision_settings | Не поддерживается
|
| | | GL_NV_alpha_test | Не поддерживается
|
| | | GL_NV_alpha_to_coverage_dither_control | Не поддерживается
|
| | | GL_NV_bgr | Не поддерживается
|
| | | GL_NV_bindless_multi_draw_indirect | Не поддерживается
|
| | | GL_NV_bindless_multi_draw_indirect_count | Не поддерживается
|
| | | GL_NV_bindless_texture | Не поддерживается
|
| | | GL_NV_blend_equation_advanced | Не поддерживается
|
| | | GL_NV_blend_equation_advanced_coherent | Не поддерживается
|
| | | GL_NV_blend_minmax | Не поддерживается
|
| | | GL_NV_blend_minmax_factor | Не поддерживается
|
| | | GL_NV_blend_square | Поддерживается
|
| | | GL_NV_centroid_sample | Не поддерживается
|
| | | GL_NV_clip_space_w_scaling | Не поддерживается
|
| | | GL_NV_command_list | Не поддерживается
|
| | | GL_NV_complex_primitives | Не поддерживается
|
| | | GL_NV_compute_program5 | Не поддерживается
|
| | | GL_NV_conditional_render | Поддерживается
|
| | | GL_NV_conservative_raster | Не поддерживается
|
| | | GL_NV_conservative_raster_dilate | Не поддерживается
|
| | | GL_NV_conservative_raster_pre_snap_triangles | Не поддерживается
|
| | | GL_NV_copy_buffer | Не поддерживается
|
| | | GL_NV_copy_depth_to_color | Не поддерживается
|
| | | GL_NV_copy_image | Не поддерживается
|
| | | GL_NV_coverage_sample | Не поддерживается
|
| | | GL_NV_deep_texture3D | Не поддерживается
|
| | | GL_NV_depth_buffer_float | Не поддерживается
|
| | | GL_NV_depth_clamp | Не поддерживается
|
| | | GL_NV_depth_nonlinear | Не поддерживается
|
| | | GL_NV_depth_range_unclamped | Не поддерживается
|
| | | GL_NV_draw_buffers | Не поддерживается
|
| | | GL_NV_draw_instanced | Не поддерживается
|
| | | GL_NV_draw_texture | Не поддерживается
|
| | | GL_NV_draw_vulkan_image | Не поддерживается
|
| | | GL_NV_EGL_stream_consumer_external | Не поддерживается
|
| | | GL_NV_ES1_1_compatibility | Не поддерживается
|
| | | GL_NV_ES3_1_compatibility | Не поддерживается
|
| | | GL_NV_evaluators | Не поддерживается
|
| | | GL_NV_explicit_attrib_location | Не поддерживается
|
| | | GL_NV_explicit_multisample | Не поддерживается
|
| | | GL_NV_fbo_color_attachments | Не поддерживается
|
| | | GL_NV_fence | Не поддерживается
|
| | | GL_NV_fill_rectangle | Не поддерживается
|
| | | GL_NV_float_buffer | Не поддерживается
|
| | | GL_NV_fog_distance | Не поддерживается
|
| | | GL_NV_fragdepth | Не поддерживается
|
| | | GL_NV_fragment_coverage_to_color | Не поддерживается
|
| | | GL_NV_fragment_program | Не поддерживается
|
| | | GL_NV_fragment_program_option | Не поддерживается
|
| | | GL_NV_fragment_program2 | Не поддерживается
|
| | | GL_NV_fragment_program4 | Не поддерживается
|
| | | GL_NV_fragment_shader_interlock | Не поддерживается
|
| | | GL_NV_framebuffer_blit | Не поддерживается
|
| | | GL_NV_framebuffer_mixed_samples | Не поддерживается
|
| | | GL_NV_framebuffer_multisample | Не поддерживается
|
| | | GL_NV_framebuffer_multisample_coverage | Не поддерживается
|
| | | GL_NV_framebuffer_multisample_ex | Не поддерживается
|
| | | GL_NV_generate_mipmap_sRGB | Не поддерживается
|
| | | GL_NV_geometry_program4 | Не поддерживается
|
| | | GL_NV_geometry_shader_passthrough | Не поддерживается
|
| | | GL_NV_geometry_shader4 | Не поддерживается
|
| | | GL_NV_gpu_program_fp64 | Не поддерживается
|
| | | GL_NV_gpu_program4 | Не поддерживается
|
| | | GL_NV_gpu_program4_1 | Не поддерживается
|
| | | GL_NV_gpu_program5 | Не поддерживается
|
| | | GL_NV_gpu_program5_mem_extended | Не поддерживается
|
| | | GL_NV_gpu_shader5 | Не поддерживается
|
| | | GL_NV_half_float | Не поддерживается
|
| | | GL_NV_instanced_arrays | Не поддерживается
|
| | | GL_NV_internalformat_sample_query | Не поддерживается
|
| | | GL_NV_light_max_exponent | Не поддерживается
|
| | | GL_NV_multisample_coverage | Не поддерживается
|
| | | GL_NV_multisample_filter_hint | Не поддерживается
|
| | | GL_NV_non_square_matrices | Не поддерживается
|
| | | GL_NV_occlusion_query | Не поддерживается
|
| | | GL_NV_pack_subimage | Не поддерживается
|
| | | GL_NV_packed_depth_stencil | Не поддерживается
|
| | | GL_NV_packed_float | Не поддерживается
|
| | | GL_NV_packed_float_linear | Не поддерживается
|
| | | GL_NV_parameter_buffer_object | Не поддерживается
|
| | | GL_NV_parameter_buffer_object2 | Не поддерживается
|
| | | GL_NV_path_rendering | Не поддерживается
|
| | | GL_NV_path_rendering_shared_edge | Не поддерживается
|
| | | GL_NV_pixel_buffer_object | Не поддерживается
|
| | | GL_NV_pixel_data_range | Не поддерживается
|
| | | GL_NV_platform_binary | Не поддерживается
|
| | | GL_NV_point_sprite | Не поддерживается
|
| | | GL_NV_present_video | Не поддерживается
|
| | | GL_NV_primitive_restart | Поддерживается
|
| | | GL_NV_query_resource | Не поддерживается
|
| | | GL_NV_query_resource_tag | Не поддерживается
|
| | | GL_NV_read_buffer | Не поддерживается
|
| | | GL_NV_read_buffer_front | Не поддерживается
|
| | | GL_NV_read_depth | Не поддерживается
|
| | | GL_NV_read_depth_stencil | Не поддерживается
|
| | | GL_NV_read_stencil | Не поддерживается
|
| | | GL_NV_register_combiners | Не поддерживается
|
| | | GL_NV_register_combiners2 | Не поддерживается
|
| | | GL_NV_robustness_video_memory_purge | Не поддерживается
|
| | | GL_NV_sample_locations | Не поддерживается
|
| | | GL_NV_sample_mask_override_coverage | Не поддерживается
|
| | | GL_NV_shader_atomic_counters | Не поддерживается
|
| | | GL_NV_shader_atomic_float | Не поддерживается
|
| | | GL_NV_shader_atomic_float64 | Не поддерживается
|
| | | GL_NV_shader_atomic_fp16_vector | Не поддерживается
|
| | | GL_NV_shader_atomic_int64 | Не поддерживается
|
| | | GL_NV_shader_buffer_load | Не поддерживается
|
| | | GL_NV_shader_buffer_store | Не поддерживается
|
| | | GL_NV_shader_storage_buffer_object | Не поддерживается
|
| | | GL_NV_shader_thread_group | Не поддерживается
|
| | | GL_NV_shader_thread_shuffle | Не поддерживается
|
| | | GL_NV_shadow_samplers_array | Не поддерживается
|
| | | GL_NV_shadow_samplers_cube | Не поддерживается
|
| | | GL_NV_sRGB_formats | Не поддерживается
|
| | | GL_NV_stereo_view_rendering | Не поддерживается
|
| | | GL_NV_tessellation_program5 | Не поддерживается
|
| | | GL_NV_texgen_emboss | Не поддерживается
|
| | | GL_NV_texgen_reflection | Поддерживается
|
| | | GL_NV_texture_array | Не поддерживается
|
| | | GL_NV_texture_barrier | Не поддерживается
|
| | | GL_NV_texture_border_clamp | Не поддерживается
|
| | | GL_NV_texture_compression_latc | Не поддерживается
|
| | | GL_NV_texture_compression_s3tc | Не поддерживается
|
| | | GL_NV_texture_compression_s3tc_update | Не поддерживается
|
| | | GL_NV_texture_compression_vtc | Не поддерживается
|
| | | GL_NV_texture_env_combine4 | Не поддерживается
|
| | | GL_NV_texture_expand_normal | Не поддерживается
|
| | | GL_NV_texture_lod_clamp | Не поддерживается
|
| | | GL_NV_texture_multisample | Не поддерживается
|
| | | GL_NV_texture_npot_2D_mipmap | Не поддерживается
|
| | | GL_NV_texture_rectangle | Не поддерживается
|
| | | GL_NV_texture_rectangle_compressed | Не поддерживается
|
| | | GL_NV_texture_shader | Не поддерживается
|
| | | GL_NV_texture_shader2 | Не поддерживается
|
| | | GL_NV_texture_shader3 | Не поддерживается
|
| | | GL_NV_timer_query | Не поддерживается
|
| | | GL_NV_transform_feedback | Не поддерживается
|
| | | GL_NV_transform_feedback2 | Не поддерживается
|
| | | GL_NV_uniform_buffer_unified_memory | Не поддерживается
|
| | | GL_NV_vdpau_interop | Не поддерживается
|
| | | GL_NV_vertex_array_range | Не поддерживается
|
| | | GL_NV_vertex_array_range2 | Не поддерживается
|
| | | GL_NV_vertex_attrib_64bit | Не поддерживается
|
| | | GL_NV_vertex_attrib_integer_64bit | Не поддерживается
|
| | | GL_NV_vertex_buffer_unified_memory | Не поддерживается
|
| | | GL_NV_vertex_program | Не поддерживается
|
| | | GL_NV_vertex_program1_1 | Не поддерживается
|
| | | GL_NV_vertex_program2 | Не поддерживается
|
| | | GL_NV_vertex_program2_option | Не поддерживается
|
| | | GL_NV_vertex_program3 | Не поддерживается
|
| | | GL_NV_vertex_program4 | Не поддерживается
|
| | | GL_NV_video_capture | Не поддерживается
|
| | | GL_NV_viewport_array2 | Не поддерживается
|
| | | GL_NV_viewport_swizzle | Не поддерживается
|
| | | GL_NVX_blend_equation_advanced_multi_draw_buffers | Не поддерживается
|
| | | GL_NVX_conditional_render | Не поддерживается
|
| | | GL_NVX_flush_hold | Не поддерживается
|
| | | GL_NVX_gpu_memory_info | Не поддерживается
|
| | | GL_NVX_instanced_arrays | Не поддерживается
|
| | | GL_NVX_multigpu_info | Не поддерживается
|
| | | GL_NVX_nvenc_interop | Не поддерживается
|
| | | GL_NVX_shader_thread_group | Не поддерживается
|
| | | GL_NVX_shader_thread_shuffle | Не поддерживается
|
| | | GL_NVX_shared_sync_object | Не поддерживается
|
| | | GL_NVX_sysmem_buffer | Не поддерживается
|
| | | GL_NVX_ycrcb | Не поддерживается
|
| | | GL_OES_blend_equation_separate | Не поддерживается
|
| | | GL_OES_blend_func_separate | Не поддерживается
|
| | | GL_OES_blend_subtract | Не поддерживается
|
| | | GL_OES_byte_coordinates | Не поддерживается
|
| | | GL_OES_compressed_EAC_R11_signed_texture | Не поддерживается
|
| | | GL_OES_compressed_EAC_R11_unsigned_texture | Не поддерживается
|
| | | GL_OES_compressed_EAC_RG11_signed_texture | Не поддерживается
|
| | | GL_OES_compressed_EAC_RG11_unsigned_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC1_RGB8_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_punchthroughA_RGBA8_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_punchthroughA_sRGB8_alpha_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_RGB8_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_RGBA8_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_sRGB8_alpha8_texture | Не поддерживается
|
| | | GL_OES_compressed_ETC2_sRGB8_texture | Не поддерживается
|
| | | GL_OES_compressed_paletted_texture | Не поддерживается
|
| | | GL_OES_conditional_query | Не поддерживается
|
| | | GL_OES_depth_texture | Не поддерживается
|
| | | GL_OES_depth_texture_cube_map | Не поддерживается
|
| | | GL_OES_depth24 | Не поддерживается
|
| | | GL_OES_depth32 | Не поддерживается
|
| | | GL_OES_draw_texture | Не поддерживается
|
| | | GL_OES_EGL_image | Не поддерживается
|
| | | GL_OES_EGL_image_external | Не поддерживается
|
| | | GL_OES_EGL_sync | Не поддерживается
|
| | | GL_OES_element_index_uint | Не поддерживается
|
| | | GL_OES_extended_matrix_palette | Не поддерживается
|
| | | GL_OES_fbo_render_mipmap | Не поддерживается
|
| | | GL_OES_fixed_point | Не поддерживается
|
| | | GL_OES_fragment_precision_high | Не поддерживается
|
| | | GL_OES_framebuffer_object | Не поддерживается
|
| | | GL_OES_get_program_binary | Не поддерживается
|
| | | GL_OES_mapbuffer | Не поддерживается
|
| | | GL_OES_matrix_get | Не поддерживается
|
| | | GL_OES_matrix_palette | Не поддерживается
|
| | | GL_OES_packed_depth_stencil | Не поддерживается
|
| | | GL_OES_point_size_array | Не поддерживается
|
| | | GL_OES_point_sprite | Не поддерживается
|
| | | GL_OES_query_matrix | Не поддерживается
|
| | | GL_OES_read_format | Не поддерживается
|
| | | GL_OES_required_internalformat | Не поддерживается
|
| | | GL_OES_rgb8_rgba8 | Не поддерживается
|
| | | GL_OES_sample_shading | Не поддерживается
|
| | | GL_OES_sample_variables | Не поддерживается
|
| | | GL_OES_shader_image_atomic | Не поддерживается
|
| | | GL_OES_shader_multisample_interpolation | Не поддерживается
|
| | | GL_OES_single_precision | Не поддерживается
|
| | | GL_OES_standard_derivatives | Не поддерживается
|
| | | GL_OES_stencil_wrap | Не поддерживается
|
| | | GL_OES_stencil1 | Не поддерживается
|
| | | GL_OES_stencil4 | Не поддерживается
|
| | | GL_OES_stencil8 | Не поддерживается
|
| | | GL_OES_surfaceless_context | Не поддерживается
|
| | | GL_OES_texture_3D | Не поддерживается
|
| | | GL_OES_texture_compression_astc | Не поддерживается
|
| | | GL_OES_texture_cube_map | Не поддерживается
|
| | | GL_OES_texture_env_crossbar | Не поддерживается
|
| | | GL_OES_texture_float | Не поддерживается
|
| | | GL_OES_texture_float_linear | Не поддерживается
|
| | | GL_OES_texture_half_float | Не поддерживается
|
| | | GL_OES_texture_half_float_linear | Не поддерживается
|
| | | GL_OES_texture_mirrored_repeat | Не поддерживается
|
| | | GL_OES_texture_npot | Не поддерживается
|
| | | GL_OES_texture_stencil8 | Не поддерживается
|
| | | GL_OES_texture_storage_multisample_2d_array | Не поддерживается
|
| | | GL_OES_vertex_array_object | Не поддерживается
|
| | | GL_OES_vertex_half_float | Не поддерживается
|
| | | GL_OES_vertex_type_10_10_10_2 | Не поддерживается
|
| | | GL_OML_interlace | Не поддерживается
|
| | | GL_OML_resample | Не поддерживается
|
| | | GL_OML_subsample | Не поддерживается
|
| | | GL_PGI_misc_hints | Не поддерживается
|
| | | GL_PGI_vertex_hints | Не поддерживается
|
| | | GL_QCOM_alpha_test | Не поддерживается
|
| | | GL_QCOM_binning_control | Не поддерживается
|
| | | GL_QCOM_driver_control | Не поддерживается
|
| | | GL_QCOM_extended_get | Не поддерживается
|
| | | GL_QCOM_extended_get2 | Не поддерживается
|
| | | GL_QCOM_perfmon_global_mode | Не поддерживается
|
| | | GL_QCOM_tiled_rendering | Не поддерживается
|
| | | GL_QCOM_writeonly_rendering | Не поддерживается
|
| | | GL_REND_screen_coordinates | Не поддерживается
|
| | | GL_S3_performance_analyzer | Не поддерживается
|
| | | GL_S3_s3tc | Не поддерживается
|
| | | GL_SGI_color_matrix | Не поддерживается
|
| | | GL_SGI_color_table | Не поддерживается
|
| | | GL_SGI_compiled_vertex_array | Не поддерживается
|
| | | GL_SGI_cull_vertex | Не поддерживается
|
| | | GL_SGI_index_array_formats | Не поддерживается
|
| | | GL_SGI_index_func | Не поддерживается
|
| | | GL_SGI_index_material | Не поддерживается
|
| | | GL_SGI_index_texture | Не поддерживается
|
| | | GL_SGI_make_current_read | Не поддерживается
|
| | | GL_SGI_texture_add_env | Не поддерживается
|
| | | GL_SGI_texture_color_table | Не поддерживается
|
| | | GL_SGI_texture_edge_clamp | Не поддерживается
|
| | | GL_SGI_texture_lod | Не поддерживается
|
| | | GL_SGIS_color_range | Не поддерживается
|
| | | GL_SGIS_detail_texture | Не поддерживается
|
| | | GL_SGIS_fog_function | Не поддерживается
|
| | | GL_SGIS_generate_mipmap | Поддерживается
|
| | | GL_SGIS_multisample | Не поддерживается
|
| | | GL_SGIS_multitexture | Не поддерживается
|
| | | GL_SGIS_pixel_texture | Не поддерживается
|
| | | GL_SGIS_point_line_texgen | Не поддерживается
|
| | | GL_SGIS_sharpen_texture | Не поддерживается
|
| | | GL_SGIS_texture_border_clamp | Не поддерживается
|
| | | GL_SGIS_texture_color_mask | Не поддерживается
|
| | | GL_SGIS_texture_edge_clamp | Поддерживается
|
| | | GL_SGIS_texture_filter4 | Не поддерживается
|
| | | GL_SGIS_texture_lod | Поддерживается
|
| | | GL_SGIS_texture_select | Не поддерживается
|
| | | GL_SGIS_texture4D | Не поддерживается
|
| | | GL_SGIX_async | Не поддерживается
|
| | | GL_SGIX_async_histogram | Не поддерживается
|
| | | GL_SGIX_async_pixel | Не поддерживается
|
| | | GL_SGIX_blend_alpha_minmax | Не поддерживается
|
| | | GL_SGIX_clipmap | Не поддерживается
|
| | | GL_SGIX_convolution_accuracy | Не поддерживается
|
| | | GL_SGIX_depth_pass_instrument | Не поддерживается
|
| | | GL_SGIX_depth_texture | Не поддерживается
|
| | | GL_SGIX_flush_raster | Не поддерживается
|
| | | GL_SGIX_fog_offset | Не поддерживается
|
| | | GL_SGIX_fog_texture | Не поддерживается
|
| | | GL_SGIX_fragment_specular_lighting | Не поддерживается
|
| | | GL_SGIX_framezoom | Не поддерживается
|
| | | GL_SGIX_instruments | Не поддерживается
|
| | | GL_SGIX_interlace | Не поддерживается
|
| | | GL_SGIX_ir_instrument1 | Не поддерживается
|
| | | GL_SGIX_list_priority | Не поддерживается
|
| | | GL_SGIX_pbuffer | Не поддерживается
|
| | | GL_SGIX_pixel_texture | Не поддерживается
|
| | | GL_SGIX_pixel_texture_bits | Не поддерживается
|
| | | GL_SGIX_reference_plane | Не поддерживается
|
| | | GL_SGIX_resample | Не поддерживается
|
| | | GL_SGIX_shadow | Не поддерживается
|
| | | GL_SGIX_shadow_ambient | Не поддерживается
|
| | | GL_SGIX_sprite | Не поддерживается
|
| | | GL_SGIX_subsample | Не поддерживается
|
| | | GL_SGIX_tag_sample_buffer | Не поддерживается
|
| | | GL_SGIX_texture_add_env | Не поддерживается
|
| | | GL_SGIX_texture_coordinate_clamp | Не поддерживается
|
| | | GL_SGIX_texture_lod_bias | Не поддерживается
|
| | | GL_SGIX_texture_multi_buffer | Не поддерживается
|
| | | GL_SGIX_texture_range | Не поддерживается
|
| | | GL_SGIX_texture_scale_bias | Не поддерживается
|
| | | GL_SGIX_vertex_preclip | Не поддерживается
|
| | | GL_SGIX_vertex_preclip_hint | Не поддерживается
|
| | | GL_SGIX_ycrcb | Не поддерживается
|
| | | GL_SGIX_ycrcb_subsample | Не поддерживается
|
| | | GL_SUN_convolution_border_modes | Не поддерживается
|
| | | GL_SUN_global_alpha | Не поддерживается
|
| | | GL_SUN_mesh_array | Не поддерживается
|
| | | GL_SUN_multi_draw_arrays | Поддерживается
|
| | | GL_SUN_read_video_pixels | Не поддерживается
|
| | | GL_SUN_slice_accum | Не поддерживается
|
| | | GL_SUN_triangle_list | Не поддерживается
|
| | | GL_SUN_vertex | Не поддерживается
|
| | | GL_SUNX_constant_data | Не поддерживается
|
| | | GL_VIV_shader_binary | Не поддерживается
|
| | | GL_WGL_ARB_extensions_string | Не поддерживается
|
| | | GL_WGL_EXT_extensions_string | Не поддерживается
|
| | | GL_WGL_EXT_swap_control | Не поддерживается
|
| | | GL_WIN_phong_shading | Не поддерживается
|
| | | GL_WIN_specular_fog | Не поддерживается
|
| | | GL_WIN_swap_hint | Поддерживается
|
| | | GLU_EXT_nurbs_tessellator | Не поддерживается
|
| | | GLU_EXT_object_space_tess | Не поддерживается
|
| | | GLU_SGI_filter4_parameters | Не поддерживается
|
| | | GLX_AMD_gpu_association | Не поддерживается
|
| | | GLX_ARB_create_context | Не поддерживается
|
| | | GLX_ARB_create_context_no_error | Не поддерживается
|
| | | GLX_ARB_create_context_profile | Не поддерживается
|
| | | GLX_ARB_create_context_robustness | Не поддерживается
|
| | | GLX_ARB_fbconfig_float | Не поддерживается
|
| | | GLX_ARB_framebuffer_sRGB | Не поддерживается
|
| | | GLX_ARB_get_proc_address | Не поддерживается
|
| | | GLX_ARB_multisample | Не поддерживается
|
| | | GLX_ARB_robustness_application_isolation | Не поддерживается
|
| | | GLX_ARB_robustness_share_group_isolation | Не поддерживается
|
| | | GLX_ARB_vertex_buffer_object | Не поддерживается
|
| | | GLX_EXT_buffer_age | Не поддерживается
|
| | | GLX_EXT_create_context_es_profile | Не поддерживается
|
| | | GLX_EXT_create_context_es2_profile | Не поддерживается
|
| | | GLX_EXT_fbconfig_packed_float | Не поддерживается
|
| | | GLX_EXT_framebuffer_sRGB | Не поддерживается
|
| | | GLX_EXT_import_context | Не поддерживается
|
| | | GLX_EXT_scene_marker | Не поддерживается
|
| | | GLX_EXT_swap_control | Не поддерживается
|
| | | GLX_EXT_swap_control_tear | Не поддерживается
|
| | | GLX_EXT_texture_from_pixmap | Не поддерживается
|
| | | GLX_EXT_visual_info | Не поддерживается
|
| | | GLX_EXT_visual_rating | Не поддерживается
|
| | | GLX_INTEL_swap_event | Не поддерживается
|
| | | GLX_MESA_agp_offset | Не поддерживается
|
| | | GLX_MESA_copy_sub_buffer | Не поддерживается
|
| | | GLX_MESA_multithread_makecurrent | Не поддерживается
|
| | | GLX_MESA_pixmap_colormap | Не поддерживается
|
| | | GLX_MESA_query_renderer | Не поддерживается
|
| | | GLX_MESA_release_buffers | Не поддерживается
|
| | | GLX_MESA_set_3dfx_mode | Не поддерживается
|
| | | GLX_MESA_swap_control | Не поддерживается
|
| | | GLX_NV_copy_image | Не поддерживается
|
| | | GLX_NV_delay_before_swap | Не поддерживается
|
| | | GLX_NV_float_buffer | Не поддерживается
|
| | | GLX_NV_multisample_coverage | Не поддерживается
|
| | | GLX_NV_present_video | Не поддерживается
|
| | | GLX_NV_swap_group | Не поддерживается
|
| | | GLX_NV_video_capture | Не поддерживается
|
| | | GLX_NV_video_out | Не поддерживается
|
| | | GLX_NV_video_output | Не поддерживается
|
| | | GLX_OML_interlace | Не поддерживается
|
| | | GLX_OML_swap_method | Не поддерживается
|
| | | GLX_OML_sync_control | Не поддерживается
|
| | | GLX_SGI_cushion | Не поддерживается
|
| | | GLX_SGI_make_current_read | Не поддерживается
|
| | | GLX_SGI_swap_control | Не поддерживается
|
| | | GLX_SGI_video_sync | Не поддерживается
|
| | | GLX_SGIS_blended_overlay | Не поддерживается
|
| | | GLX_SGIS_color_range | Не поддерживается
|
| | | GLX_SGIS_multisample | Не поддерживается
|
| | | GLX_SGIX_dm_buffer | Не поддерживается
|
| | | GLX_SGIX_fbconfig | Не поддерживается
|
| | | GLX_SGIX_hyperpipe | Не поддерживается
|
| | | GLX_SGIX_pbuffer | Не поддерживается
|
| | | GLX_SGIX_swap_barrier | Не поддерживается
|
| | | GLX_SGIX_swap_group | Не поддерживается
|
| | | GLX_SGIX_video_resize | Не поддерживается
|
| | | GLX_SGIX_video_source | Не поддерживается
|
| | | GLX_SGIX_visual_select_group | Не поддерживается
|
| | | GLX_SUN_get_transparent_index | Не поддерживается
|
| | | GLX_SUN_video_resize | Не поддерживается
|
| | | WGL_3DFX_gamma_control | Не поддерживается
|
| | | WGL_3DFX_multisample | Не поддерживается
|
| | | WGL_3DL_stereo_control | Не поддерживается
|
| | | WGL_AMD_gpu_association | Не поддерживается
|
| | | WGL_AMDX_gpu_association | Не поддерживается
|
| | | WGL_ARB_buffer_region | Поддерживается
|
| | | WGL_ARB_context_flush_control | Не поддерживается
|
| | | WGL_ARB_create_context | Поддерживается
|
| | | WGL_ARB_create_context_no_error | Не поддерживается
|
| | | WGL_ARB_create_context_profile | Поддерживается
|
| | | WGL_ARB_create_context_robustness | Поддерживается
|
| | | WGL_ARB_extensions_string | Поддерживается
|
| | | WGL_ARB_framebuffer_sRGB | Поддерживается
|
| | | WGL_ARB_make_current_read | Поддерживается
|
| | | WGL_ARB_multisample | Поддерживается
|
| | | WGL_ARB_pbuffer | Поддерживается
|
| | | WGL_ARB_pixel_format | Поддерживается
|
| | | WGL_ARB_pixel_format_float | Поддерживается
|
| | | WGL_ARB_render_texture | Не поддерживается
|
| | | WGL_ARB_robustness_application_isolation | Не поддерживается
|
| | | WGL_ARB_robustness_share_group_isolation | Не поддерживается
|
| | | WGL_ATI_pbuffer_memory_hint | Не поддерживается
|
| | | WGL_ATI_pixel_format_float | Не поддерживается
|
| | | WGL_ATI_render_texture_rectangle | Не поддерживается
|
| | | WGL_EXT_buffer_region | Не поддерживается
|
| | | WGL_EXT_colorspace | Не поддерживается
|
| | | WGL_EXT_create_context_es_profile | Поддерживается
|
| | | WGL_EXT_create_context_es2_profile | Поддерживается
|
| | | WGL_EXT_depth_float | Поддерживается
|
| | | WGL_EXT_display_color_table | Не поддерживается
|
| | | WGL_EXT_extensions_string | Поддерживается
|
| | | WGL_EXT_framebuffer_sRGB | Не поддерживается
|
| | | WGL_EXT_framebuffer_sRGBWGL_ARB_create_context | Не поддерживается
|
| | | WGL_EXT_gamma_control | Не поддерживается
|
| | | WGL_EXT_make_current_read | Не поддерживается
|
| | | WGL_EXT_multisample | Не поддерживается
|
| | | WGL_EXT_pbuffer | Не поддерживается
|
| | | WGL_EXT_pixel_format | Не поддерживается
|
| | | WGL_EXT_pixel_format_packed_float | Поддерживается
|
| | | WGL_EXT_render_texture | Не поддерживается
|
| | | WGL_EXT_swap_control | Поддерживается
|
| | | WGL_EXT_swap_control_tear | Поддерживается
|
| | | WGL_EXT_swap_interval | Не поддерживается
|
| | | WGL_I3D_digital_video_control | Не поддерживается
|
| | | WGL_I3D_gamma | Не поддерживается
|
| | | WGL_I3D_genlock | Не поддерживается
|
| | | WGL_I3D_image_buffer | Не поддерживается
|
| | | WGL_I3D_swap_frame_lock | Не поддерживается
|
| | | WGL_I3D_swap_frame_usage | Не поддерживается
|
| | | WGL_INTEL_cl_sharing | Не поддерживается
|
| | | WGL_MTX_video_preview | Не поддерживается
|
| | | WGL_NV_bridged_display | Не поддерживается
|
| | | WGL_NV_copy_image | Не поддерживается
|
| | | WGL_NV_delay_before_swap | Не поддерживается
|
| | | WGL_NV_DX_interop | Поддерживается
|
| | | WGL_NV_DX_interop2 | Не поддерживается
|
| | | WGL_NV_float_buffer | Не поддерживается
|
| | | WGL_NV_gpu_affinity | Не поддерживается
|
| | | WGL_NV_multisample_coverage | Не поддерживается
|
| | | WGL_NV_present_video | Не поддерживается
|
| | | WGL_NV_render_depth_texture | Не поддерживается
|
| | | WGL_NV_render_texture_rectangle | Не поддерживается
|
| | | WGL_NV_swap_group | Не поддерживается
|
| | | WGL_NV_texture_rectangle | Не поддерживается
|
| | | WGL_NV_vertex_array_range | Не поддерживается
|
| | | WGL_NV_video_capture | Не поддерживается
|
| | | WGL_NV_video_output | Не поддерживается
|
| | | WGL_NVX_DX_interop | Не поддерживается
|
| | | WGL_OML_sync_control | Не поддерживается
|
| | | WGL_S3_cl_sharingWGL_ARB_create_context_profile | Не поддерживается
|
|
|
| | Поддерживаемые форматы сжатых текстур:
|
| | | RGB DXT1 | Поддерживается
|
| | | RGBA DXT1 | Поддерживается
|
| | | RGBA DXT3 | Поддерживается
|
| | | RGBA DXT5 | Поддерживается
|
| | | RGB FXT1 | Поддерживается
|
| | | RGBA FXT1 | Поддерживается
|
| | | 3Dc | Не поддерживается
|
|
|
| | Производитель видеоадаптера:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/graphics
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
| | | | |
|
| [ Устройства ]
|
|
|
| | Batteries:
|
| | | Microsoft AC Adapter | 6.1.7600.16385
|
| | | Microsoft ACPI-Compliant Control Method Battery | 6.1.7600.16385
|
| | | Microsoft Composite Battery | 6.1.7600.16385
|
|
|
| | Bluetooth Radios:
|
| | | Generic Bluetooth Adapter | 6.1.7601.23403
|
| | | Microsoft Bluetooth Enumerator | 6.1.7601.23403
|
|
|
| | Computer:
|
| | | ACPI x64-based PC | 6.1.7600.16385
|
|
|
| | Disk drives:
|
| | | Samsung SSD 860 PRO 256GB ATA Device | 6.1.7601.23403
|
|
|
| | Display adapters:
|
| | | Intel(R) HD Graphics 4600 | 10.18.10.4013
|
| | | NVIDIA GeForce GTX 950M | 9.18.13.4752
|
|
|
| | DVD/CD-ROM drives:
|
| | | TSSTcorp CDDVDW SN-208FB ATA Device | 6.1.7601.23403
|
|
|
| | Human Interface Devices:
|
| | | HID-compliant consumer control device | 6.1.7600.16385
|
| | | HID-compliant device | 6.1.7601.23403
|
| | | HID-compliant device | 6.1.7601.23403
|
| | | USB Input Device | 6.1.7601.23403
|
| | | USB Input Device | 6.1.7601.23403
|
|
|
| | IDE ATA/ATAPI controllers:
|
| | | ATA Channel 0 | 6.1.7601.23403
|
| | | ATA Channel 2 | 6.1.7601.23403
|
| | | ATA Channel 5 | 6.1.7601.23403
|
| | | Intel(R) 8 Series SATA AHCI Controller - 8C03 | 9.4.0.1023
|
|
|
| | Keyboards:
|
| | | HID Keyboard Device | 6.1.7601.23403
|
| | | Standard PS/2 Keyboard | 6.1.7601.23403
|
|
|
| | Memory technology driver:
|
| | | Realtek PCIE CardReader | 6.3.9600.29075
|
| | | Realtek PCIE CardReader | 6.3.9600.21257
|
|
|
| | Mice and other pointing devices:
|
| | | HID-compliant mouse | 6.1.7600.16385
|
| | | Synaptics PS/2 Port TouchPad | 18.0.5.0
|
|
|
| | Monitors:
|
| | | Generic PnP Monitor | 6.1.7601.23403
|
|
|
| | Network adapters:
|
| | | Bluetooth Device (Personal Area Network) | 6.1.7601.23863
|
| | | Bluetooth Device (RFCOMM Protocol TDI) | 6.1.7600.16385
|
| | | Kaspersky Security Data Escort Adapter | 9.0.0.21
|
| | | Microsoft ISATAP Adapter | 6.1.7600.16385
|
| | | Realtek PCIe GBE Family Controller | 5.836.125.2018
|
| | | Realtek RTL8723BE Wireless LAN 802.11n PCI-E NIC | 2012.12.325.2014
|
| | | WAN Miniport (IKEv2) | 6.1.7601.23403
|
| | | WAN Miniport (IP) | 6.1.7601.23403
|
| | | WAN Miniport (IPv6) | 6.1.7601.23403
|
| | | WAN Miniport (L2TP) | 6.1.7601.23403
|
| | | WAN Miniport (Network Monitor) | 6.1.7601.23403
|
| | | WAN Miniport (PPPOE) | 6.1.7601.23403
|
| | | WAN Miniport (PPTP) | 6.1.7601.23403
|
| | | WAN Miniport (SSTP) | 6.1.7601.17514
|
| | | Адаптер Microsoft ISATAP #2 | 6.1.7600.16385
|
| | | Адаптер Microsoft ISATAP #3 | 6.1.7600.16385
|
| | | Адаптер Microsoft ISATAP #4 | 6.1.7600.16385
|
|
|
| | Non-Plug and Play Drivers:
|
| | | aksdf |
|
| | | aksfridge |
|
| | | Ancillary Function Driver for Winsock |
|
| | | AO Kaspersky Lab Cryptographic Module x64 (56 bit) |
|
| | | Beep |
|
| | | Bitlocker Drive Encryption Filter Driver |
|
| | | CNG |
|
| | | Common Log (CLFS) |
|
| | | Disk Virtual Machine Bus Acceleration Filter Driver |
|
| | | Dynamic Volume Manager |
|
| | | Etron Enhance USB BOT/UASP Mass Storage Driver |
|
| | | Hardware Policy Driver |
|
| | | HTTP |
|
| | | Kaspersky Anti-Virus NDIS 6 Filter |
|
| | | Kaspersky Lab klbackupdisk |
|
| | | Kernel Mode Driver Frameworks service |
|
| | | kl1 |
|
| | | kldisk |
|
| | | kltdi |
|
| | | KLwtp - WFP callout traffic inspector |
|
| | | kneps |
|
| | | KSecDD |
|
| | | KSecPkg |
|
| | | LDDM Graphics Subsystem |
|
| | | Link-Layer Topology Discovery Mapper I/O Driver |
|
| | | Link-Layer Topology Discovery Responder |
|
| | | Micron PCIe SSD Filter Driver |
|
| | | Mount Point Manager |
|
| | | msisadrv |
|
| | | NativeWiFi Filter |
|
| | | NDIS System Driver |
|
| | | NDIS Usermode I/O Protocol |
|
| | | NDProxy |
|
| | | NETBT |
|
| | | NetIO Legacy TDI Support Driver |
|
| | | NSI proxy service driver. |
|
| | | Null |
|
| | | nvpciflt |
|
| | | NvStreamKms |
|
| | | OEM-SLP2.1 Driver (HPD64) |
|
| | | PEAUTH |
|
| | | Performance Counters for Windows Driver |
|
| | | QoS Packet Scheduler |
|
| | | QWAVE driver |
|
| | | RDP Encoder Mirror Driver |
|
| | | RDPCDD |
|
| | | Reflector Display Driver used to gain access to graphics data |
|
| | | Remote Access IPv6 ARP Driver |
|
| | | Security Processor Loader Driver |
|
| | | SSD Device Filter |
|
| | | SSPORT |
|
| | | System Attribute Cache |
|
| | | TCP/IP Protocol Driver |
|
| | | TCP/IP Registry Compatibility |
|
| | | User Mode Driver Frameworks Platform Driver |
|
| | | VgaSave |
|
| | | WFP Lightweight Filter |
|
| | | Windows Firewall Authorization Driver |
|
| | | Канал IDE |
|
| | | Тома запоминающих устройств |
|
|
|
| | Processors:
|
| | | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz | 6.1.7600.16385
|
| | | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz | 6.1.7600.16385
|
|
|
| | Sound, video and game controllers:
|
| | | NVIDIA Virtual Audio Device (Wave Extensible) (WDM) | 1.2.27.0
|
| | | VIA HD Audio | 6.0.11.600
|
|
|
| | Storage controllers:
|
| | | DAEMON Tools Pro Virtual SCSI Bus | 5.28.0.0
|
|
|
| | Storage Volumes:
|
| | | Generic volume | 6.1.7601.23403
|
| | | Generic volume | 6.1.7601.23403
|
| | | Generic volume | 6.1.7601.23403
|
|
|
| | System devices:
|
| | | ACPI Fixed Feature Button | 6.1.7601.23403
|
| | | ACPI Lid | 6.1.7601.23403
|
| | | ACPI Power Button | 6.1.7601.23403
|
| | | ACPI Sleep Button | 6.1.7601.23403
|
| | | ACPI Thermal Zone | 6.1.7601.23403
|
| | | Composite Bus Enumerator | 6.1.7601.17514
|
| | | Direct memory access controller | 6.1.7601.23403
|
| | | File as Volume Driver | 6.1.7600.16385
|
| | | High Definition Audio Controller | 6.1.7601.23403
|
| | | High precision event timer | 6.1.7601.23403
|
| | | Intel(R) 8 Series/C220 Series PCI Express Root Port #1 - 8C10 | 9.4.0.1023
|
| | | Intel(R) 8 Series/C220 Series PCI Express Root Port #2 - 8C12 | 9.4.0.1023
|
| | | Intel(R) 8 Series/C220 Series PCI Express Root Port #3 - 8C14 | 9.4.0.1023
|
| | | Intel(R) 8 Series/C220 Series PCI Express Root Port #4 - 8C16 | 9.4.0.1023
|
| | | Intel(R) 82802 Firmware Hub Device | 6.1.7601.23403
|
| | | Intel(R) HM86 LPC Controller - 8C49 | 9.4.0.1023
|
| | | Intel(R) Management Engine Interface | 10.0.0.1204
|
| | | Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor DRAM Controller - 0C04 | 9.4.0.1023
|
| | | Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor PCI Express x16 Controller - 0C01 | 9.4.0.1023
|
| | | Kaspersky Lab power events provider | 20.0.68.0
|
| | | Microsoft ACPI-Compliant Embedded Controller | 6.1.7601.23403
|
| | | Microsoft ACPI-Compliant System | 6.1.7601.23403
|
| | | Microsoft System Management BIOS Driver | 6.1.7601.23403
|
| | | Microsoft Virtual Drive Enumerator Driver | 6.1.7601.23403
|
| | | Microsoft Windows Management Interface for ACPI | 6.1.7601.23403
|
| | | Microsoft Windows Management Interface for ACPI | 6.1.7601.23403
|
| | | Motherboard resources | 6.1.7601.23403
|
| | | Motherboard resources | 6.1.7601.23403
|
| | | Motherboard resources | 6.1.7601.23403
|
| | | Motherboard resources | 6.1.7601.23403
|
| | | Motherboard resources | 6.1.7601.23403
|
| | | Numeric data processor | 6.1.7601.23403
|
| | | Plug and Play Software Device Enumerator | 6.1.7601.23403
|
| | | Programmable interrupt controller | 6.1.7601.23403
|
| | | Remote Desktop Device Redirector Bus | 6.1.7600.16385
|
| | | Synaptics SMBus Driver | 18.0.5.0
|
| | | System board | 6.1.7601.23403
|
| | | System CMOS/real time clock | 6.1.7601.23403
|
| | | System timer | 6.1.7601.23403
|
| | | Terminal Server Keyboard Driver | 6.1.7601.23403
|
| | | Terminal Server Mouse Driver | 6.1.7601.23403
|
| | | UMBus Enumerator | 6.1.7601.23403
|
| | | UMBus Root Bus Enumerator | 6.1.7601.23403
|
| | | Volume Manager | 6.1.7601.23403
|
| | | Шина PCI | 5.0.4.43
|
|
|
| | Universal Serial Bus controllers:
|
| | | Generic USB Hub | 6.1.7601.23933
|
| | | Generic USB Hub | 6.1.7601.23933
|
| | | Intel(R) 8 Series/C220 Series USB EHCI #1 - 8C26 | 9.4.0.1025
|
| | | Intel(R) 8 Series/C220 Series USB EHCI #2 - 8C2D | 9.4.0.1025
|
| | | USB Composite Device | 6.1.7601.23933
|
| | | USB Root Hub | 6.1.7601.23933
|
| | | USB Root Hub | 6.1.7601.23933
|
| | | Корневой концентратор Intel(R) USB 3.0 | 5.0.4.43
|
| | | Расширяемый хост-контроллер Intel(R) USB 3.0 | 5.0.4.43
|
|
|
| [ Batteries / Microsoft AC Adapter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft AC Adapter
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | battery.inf
|
| | | INF Section | AcAdapter_Inst
|
| | | Аппаратный ID | ACPI\ACPI0003
|
| | | PnP-устройство | Microsoft AC Adapter
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Batteries / Microsoft ACPI-Compliant Control Method Battery ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft ACPI-Compliant Control Method Battery
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | battery.inf
|
| | | INF Section | CmBatt_Inst
|
| | | Аппаратный ID | ACPI\PNP0C0A
|
| | | PnP-устройство | Control Method Battery
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Batteries / Microsoft Composite Battery ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft Composite Battery
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | battery.inf
|
| | | INF Section | COMPBATT_Inst.NT
|
| | | Аппаратный ID | COMPOSITE_BATTERY
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Bluetooth Radios / Generic Bluetooth Adapter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic Bluetooth Adapter
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | bth.inf
|
| | | INF Section | Bthusb.NT
|
| | | Аппаратный ID | USB\VID_0BDA&PID_B002&REV_0200
|
| | | Сведения о размещении | Port_#0007.Hub_#0001
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Bluetooth Radios / Microsoft Bluetooth Enumerator ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft Bluetooth Enumerator
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | bth.inf
|
| | | INF Section | BthEnum.NT
|
| | | Аппаратный ID | BTH\MS_BTHBRB
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Computer / ACPI x64-based PC ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI x64-based PC
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | hal.inf
|
| | | INF Section | ACPI_AMD64_HAL
|
| | | Аппаратный ID | acpiapic
|
|
|
| [ Disk drives / Samsung SSD 860 PRO 256GB ATA Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Samsung SSD 860 PRO 256GB ATA Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | disk.inf
|
| | | INF Section | disk_install.NT
|
| | | Аппаратный ID | IDE\DiskSamsung_SSD_860_PRO_256GB_______________RVM01B6Q
|
| | | Сведения о размещении | Channel 5, Target 0, Lun 0
|
|
|
| | Производитель устройства:
|
| | | Фирма | Samsung
|
| | | Информация о продукте | http://www.samsung.com/us/computer/solid-state-drives
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Display adapters / Intel(R) HD Graphics 4600 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) HD Graphics 4600
|
| | | Дата драйвера | 11.11.2014
|
| | | Версия драйвера | 10.18.10.4013
|
| | | Поставщик драйвера | Intel Corporation
|
| | | INF-файл | oem33.inf
|
| | | INF Section | iHSWM_w7
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_0416&SUBSYS_65051558&REV_06
|
| | | Сведения о размещении | PCI bus 0, device 2, function 0
|
| | | PCI-устройство | Intel Haswell-MB GT2 - Integrated Graphics Controller
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 65536
|
| | | Память | 000A0000-000BFFFF
|
| | | Память | D0000000-DFFFFFFF
|
| | | Память | F7400000-F77FFFFF
|
| | | Порт | 03B0-03BB
|
| | | Порт | 03C0-03DF
|
| | | Порт | F000-F03F
|
|
|
| | Производитель видеоадаптера:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/graphics
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Display adapters / NVIDIA GeForce GTX 950M ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NVIDIA GeForce GTX 950M
|
| | | Дата драйвера | 05.02.2015
|
| | | Версия драйвера | 9.18.13.4752
|
| | | Поставщик драйвера | NVIDIA
|
| | | INF-файл | oem34.inf
|
| | | INF Section | Section065
|
| | | Аппаратный ID | PCI\VEN_10DE&DEV_139A&SUBSYS_65051558&REV_A2
|
| | | Сведения о размещении | PCI bus 1, device 0, function 0
|
| | | PCI-устройство | nVIDIA GeForce GTX 950M (Clevo) Video Adapter
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 65536
|
| | | Память | E0000000-EFFFFFFF
|
| | | Память | F0000000-F1FFFFFF
|
| | | Память | F6000000-F6FFFFFF
|
| | | Порт | E000-E07F
|
|
|
| | Производитель видеоадаптера:
|
| | | Фирма | NVIDIA Corporation
|
| | | Информация о продукте | http://www.nvidia.com/page/products.html
|
| | | Загрузка драйверов | http://www.nvidia.com/content/drivers/drivers.asp
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ DVD/CD-ROM drives / TSSTcorp CDDVDW SN-208FB ATA Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | TSSTcorp CDDVDW SN-208FB ATA Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | cdrom.inf
|
| | | INF Section | cdrom_install
|
| | | Аппаратный ID | IDE\CdRomTSSTcorp_CDDVDW_SN-208FB________________TC00____
|
| | | Сведения о размещении | Channel 0, Target 0, Lun 0
|
|
|
| | Производитель устройства:
|
| | | Фирма | Toshiba Samsung Storage Technology
|
| | | Информация о продукте | http://www.tsstorage.com/tsst/index_e.html
|
| | | Загрузка прошивки | http://www.samsungodd.com/eng/LiveUpdate/LiveUpdate.asp
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Human Interface Devices / HID-compliant consumer control device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HID-compliant consumer control device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | hidserv.inf
|
| | | INF Section | HIDSystemConsumerDevice
|
| | | Аппаратный ID | HID\VID_09DA&PID_9090&REV_0103&MI_00&Col03
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Human Interface Devices / HID-compliant device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HID-compliant device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | input.inf
|
| | | INF Section | HID_Raw_Inst.NT
|
| | | Аппаратный ID | HID\VID_09DA&PID_9090&REV_0103&MI_00&Col02
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Human Interface Devices / HID-compliant device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HID-compliant device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | input.inf
|
| | | INF Section | HID_Raw_Inst.NT
|
| | | Аппаратный ID | HID\VID_09DA&PID_9090&REV_0103&MI_00&Col04
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Human Interface Devices / USB Input Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | USB Input Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | input.inf
|
| | | INF Section | HID_Inst.NT
|
| | | Аппаратный ID | USB\VID_09DA&PID_9090&REV_0103&MI_01
|
| | | Сведения о размещении | 0000.0014.0000.002.000.000.000.000.000
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Human Interface Devices / USB Input Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | USB Input Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | input.inf
|
| | | INF Section | HID_Inst.NT
|
| | | Аппаратный ID | USB\VID_09DA&PID_9090&REV_0103&MI_00
|
| | | Сведения о размещении | 0000.0014.0000.002.000.000.000.000.000
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ IDE ATA/ATAPI controllers / ATA Channel 0 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ATA Channel 0
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | mshdc.inf
|
| | | INF Section | atapi_Inst
|
| | | Аппаратный ID | Intel-8c03
|
| | | Сведения о размещении | Channel 0
|
|
|
| [ IDE ATA/ATAPI controllers / ATA Channel 2 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ATA Channel 2
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | mshdc.inf
|
| | | INF Section | atapi_Inst
|
| | | Аппаратный ID | Intel-8c03
|
| | | Сведения о размещении | Channel 2
|
|
|
| [ IDE ATA/ATAPI controllers / ATA Channel 5 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ATA Channel 5
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | mshdc.inf
|
| | | INF Section | atapi_Inst
|
| | | Аппаратный ID | Intel-8c03
|
| | | Сведения о размещении | Channel 5
|
|
|
| [ IDE ATA/ATAPI controllers / Intel(R) 8 Series SATA AHCI Controller - 8C03 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series SATA AHCI Controller - 8C03
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem38.inf
|
| | | INF Section | Intel_msahci_Inst
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C03&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 31, function 2
|
| | | PCI-устройство | Intel Lynx Point-M PCH - SATA AHCI Controller (Ports 0-5) [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 19
|
| | | Память | F7B1A000-F7B1A7FF
|
| | | Порт | F060-F07F
|
| | | Порт | F080-F083
|
| | | Порт | F090-F097
|
| | | Порт | F0A0-F0A3
|
| | | Порт | F0B0-F0B7
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Keyboards / HID Keyboard Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HID Keyboard Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | keyboard.inf
|
| | | INF Section | HID_Keyboard_Inst.NT
|
| | | Аппаратный ID | HID\VID_09DA&PID_9090&REV_0103&MI_00&Col01
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Keyboards / Standard PS/2 Keyboard ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Standard PS/2 Keyboard
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | keyboard.inf
|
| | | INF Section | STANDARD_Inst
|
| | | Аппаратный ID | ACPI\MSFT0001
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 01
|
| | | Порт | 0060-0060
|
| | | Порт | 0064-0064
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Memory technology driver / Realtek PCIE CardReader ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Realtek PCIE CardReader
|
| | | Дата драйвера | 20.01.2014
|
| | | Версия драйвера | 6.3.9600.29075
|
| | | Поставщик драйвера | Realtek Semiconduct Corp.
|
| | | INF-файл | oem42.inf
|
| | | INF Section | Rts5229.Inst.NTAMD64
|
| | | Аппаратный ID | PCI\VEN_10EC&DEV_5229&SUBSYS_65051558&REV_01
|
| | | Сведения о размещении | PCI bus 3, device 0, function 0
|
| | | PCI-устройство | Realtek RTS5229 PCI-E Card Reader
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 65536
|
| | | Память | F7A00000-F7A00FFF
|
|
|
| [ Memory technology driver / Realtek PCIE CardReader ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Realtek PCIE CardReader
|
| | | Дата драйвера | 20.06.2014
|
| | | Версия драйвера | 6.3.9600.21257
|
| | | Поставщик драйвера | Realtek Semiconduct Corp.
|
| | | INF-файл | oem43.inf
|
| | | INF Section | RTL8411B.Inst.NTAMD64
|
| | | Аппаратный ID | PCI\VEN_10EC&DEV_5287&SUBSYS_65041558&REV_01
|
| | | Сведения о размещении | PCI bus 5, device 0, function 0
|
| | | PCI-устройство | Realtek RTS5287 PCI-E Card Reader
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 65536
|
| | | Память | F7815000-F7815FFF
|
|
|
| [ Mice and other pointing devices / HID-compliant mouse ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HID-compliant mouse
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | msmouse.inf
|
| | | INF Section | HID_Mouse_Inst.NT
|
| | | Аппаратный ID | HID\VID_09DA&PID_9090&REV_0103&MI_01
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Mice and other pointing devices / Synaptics PS/2 Port TouchPad ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Synaptics PS/2 Port TouchPad
|
| | | Дата драйвера | 20.12.2013
|
| | | Версия драйвера | 18.0.5.0
|
| | | Поставщик драйвера | Synaptics
|
| | | INF-файл | oem45.inf
|
| | | INF Section | Clevo_GROUP1_PS2_Inst
|
| | | Аппаратный ID | ACPI\SYN1212
|
| | | PnP-устройство | Synaptics PS/2 Port TouchPad
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 12
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Monitors / Generic PnP Monitor ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic PnP Monitor
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | monitor.inf
|
| | | INF Section | PnPMonitor.Install
|
| | | Аппаратный ID | MONITOR\CMO1720
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Bluetooth Device (Personal Area Network) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Bluetooth Device (Personal Area Network)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23863
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | bthpan.inf
|
| | | INF Section | BthPan.Install
|
| | | Аппаратный ID | BTH\MS_BTHPAN
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Bluetooth Device (RFCOMM Protocol TDI) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Bluetooth Device (RFCOMM Protocol TDI)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | tdibth.inf
|
| | | INF Section | RFCOMM.Install
|
| | | Аппаратный ID | BTH\MS_RFCOMM
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Kaspersky Security Data Escort Adapter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Kaspersky Security Data Escort Adapter
|
| | | Дата драйвера | 05.11.2014
|
| | | Версия драйвера | 9.0.0.21
|
| | | Поставщик драйвера | Kaspersky Security Data Escort Provider
|
| | | INF-файл | oem53.inf
|
| | | INF Section | kltap.ndi.NTAMD64
|
| | | Аппаратный ID | kltap
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Microsoft ISATAP Adapter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft ISATAP Adapter
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Аппаратный ID | *ISATAP
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Realtek PCIe GBE Family Controller ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Realtek PCIe GBE Family Controller
|
| | | Дата драйвера | 25.01.2018
|
| | | Версия драйвера | 5.836.125.2018
|
| | | Поставщик драйвера | Realtek Semiconductor Corp.
|
| | | INF-файл | oem49.inf
|
| | | INF Section | RTL8168GUWakeOnLinkUpa.ndi.NT
|
| | | Аппаратный ID | PCI\VEN_10EC&DEV_8168&SUBSYS_65041558&REV_12
|
| | | Сведения о размещении | PCI bus 5, device 0, function 1
|
| | | PCI-устройство | Realtek RTL8168/8111 PCI-E Gigabit Ethernet Adapter
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 19
|
| | | Память | F7810000-F7813FFF
|
| | | Память | F7814000-F7814FFF
|
| | | Порт | C000-C0FF
|
|
|
| | Производитель сетевого адаптера:
|
| | | Фирма | Realtek Semiconductor Corp.
|
| | | Информация о продукте | http://www.realtek.com.tw/products/productsView.aspx?Langid=1&PNid=7&PFid=10&Level=3&Conn=2
|
| | | Загрузка драйверов | http://www.realtek.com.tw/downloads
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Realtek RTL8723BE Wireless LAN 802.11n PCI-E NIC ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Realtek RTL8723BE Wireless LAN 802.11n PCI-E NIC
|
| | | Дата драйвера | 01.04.2014
|
| | | Версия драйвера | 2012.12.325.2014
|
| | | Поставщик драйвера | Realtek Semiconductor Corp.
|
| | | INF-файл | oem50.inf
|
| | | INF Section | RTL8723be.ndi.NT
|
| | | Аппаратный ID | PCI\VEN_10EC&DEV_B723&SUBSYS_B72910EC&REV_00
|
| | | Сведения о размещении | PCI bus 4, device 0, function 0
|
| | | PCI-устройство | Realtek RTL8723BE Wireless LAN 802.11n PCI-E Network Adapter
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 18
|
| | | Память | F7900000-F7903FFF
|
| | | Порт | D000-D0FF
|
|
|
| | Производитель сетевого адаптера:
|
| | | Фирма | Realtek Semiconductor Corp.
|
| | | Информация о продукте | http://www.realtek.com.tw/products/productsView.aspx?Langid=1&PNid=7&PFid=10&Level=3&Conn=2
|
| | | Загрузка драйверов | http://www.realtek.com.tw/downloads
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (IKEv2) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (IKEv2)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netavpna.inf
|
| | | INF Section | Ndi-Mp-AgileVpn
|
| | | Аппаратный ID | ms_agilevpnminiport
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (IP) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (IP)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-Ip
|
| | | Аппаратный ID | ms_ndiswanip
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (IPv6) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (IPv6)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-Ipv6
|
| | | Аппаратный ID | ms_ndiswanipv6
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (L2TP) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (L2TP)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-L2tp
|
| | | Аппаратный ID | ms_l2tpminiport
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (Network Monitor) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (Network Monitor)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-Bh
|
| | | Аппаратный ID | ms_ndiswanbh
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (PPPOE) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (PPPOE)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-Pppoe
|
| | | Аппаратный ID | ms_pppoeminiport
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (PPTP) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (PPTP)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netrasa.inf
|
| | | INF Section | Ndi-Mp-Pptp
|
| | | Аппаратный ID | ms_pptpminiport
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / WAN Miniport (SSTP) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WAN Miniport (SSTP)
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.17514
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | netsstpa.inf
|
| | | INF Section | Ndi-Mp-Sstp
|
| | | Аппаратный ID | ms_sstpminiport
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Адаптер Microsoft ISATAP #2 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Адаптер Microsoft ISATAP #2
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Аппаратный ID | *ISATAP
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Адаптер Microsoft ISATAP #3 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Адаптер Microsoft ISATAP #3
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Аппаратный ID | *ISATAP
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Network adapters / Адаптер Microsoft ISATAP #4 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Адаптер Microsoft ISATAP #4
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | nettun.inf
|
| | | INF Section | ISATAP.ndi
|
| | | Аппаратный ID | *ISATAP
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Non-Plug and Play Drivers / aksdf ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | aksdf
|
|
|
| [ Non-Plug and Play Drivers / aksfridge ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | aksfridge
|
|
|
| [ Non-Plug and Play Drivers / Ancillary Function Driver for Winsock ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Ancillary Function Driver for Winsock
|
|
|
| [ Non-Plug and Play Drivers / AO Kaspersky Lab Cryptographic Module x64 (56 bit) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | AO Kaspersky Lab Cryptographic Module x64 (56 bit)
|
|
|
| [ Non-Plug and Play Drivers / Beep ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Beep
|
|
|
| [ Non-Plug and Play Drivers / Bitlocker Drive Encryption Filter Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Bitlocker Drive Encryption Filter Driver
|
|
|
| [ Non-Plug and Play Drivers / CNG ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | CNG
|
|
|
| [ Non-Plug and Play Drivers / Common Log (CLFS) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Common Log (CLFS)
|
|
|
| [ Non-Plug and Play Drivers / Disk Virtual Machine Bus Acceleration Filter Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Disk Virtual Machine Bus Acceleration Filter Driver
|
|
|
| [ Non-Plug and Play Drivers / Dynamic Volume Manager ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Dynamic Volume Manager
|
|
|
| [ Non-Plug and Play Drivers / Etron Enhance USB BOT/UASP Mass Storage Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Etron Enhance USB BOT/UASP Mass Storage Driver
|
|
|
| [ Non-Plug and Play Drivers / Hardware Policy Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Hardware Policy Driver
|
|
|
| [ Non-Plug and Play Drivers / HTTP ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | HTTP
|
|
|
| [ Non-Plug and Play Drivers / Kaspersky Anti-Virus NDIS 6 Filter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Kaspersky Anti-Virus NDIS 6 Filter
|
|
|
| [ Non-Plug and Play Drivers / Kaspersky Lab klbackupdisk ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Kaspersky Lab klbackupdisk
|
|
|
| [ Non-Plug and Play Drivers / Kernel Mode Driver Frameworks service ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Kernel Mode Driver Frameworks service
|
|
|
| [ Non-Plug and Play Drivers / kl1 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | kl1
|
|
|
| [ Non-Plug and Play Drivers / kldisk ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | kldisk
|
|
|
| [ Non-Plug and Play Drivers / kltdi ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | kltdi
|
|
|
| [ Non-Plug and Play Drivers / KLwtp - WFP callout traffic inspector ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | KLwtp - WFP callout traffic inspector
|
|
|
| [ Non-Plug and Play Drivers / kneps ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | kneps
|
|
|
| [ Non-Plug and Play Drivers / KSecDD ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | KSecDD
|
|
|
| [ Non-Plug and Play Drivers / KSecPkg ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | KSecPkg
|
|
|
| [ Non-Plug and Play Drivers / LDDM Graphics Subsystem ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | LDDM Graphics Subsystem
|
|
|
| [ Non-Plug and Play Drivers / Link-Layer Topology Discovery Mapper I/O Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Link-Layer Topology Discovery Mapper I/O Driver
|
|
|
| [ Non-Plug and Play Drivers / Link-Layer Topology Discovery Responder ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Link-Layer Topology Discovery Responder
|
|
|
| [ Non-Plug and Play Drivers / Micron PCIe SSD Filter Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Micron PCIe SSD Filter Driver
|
|
|
| [ Non-Plug and Play Drivers / Mount Point Manager ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Mount Point Manager
|
|
|
| [ Non-Plug and Play Drivers / msisadrv ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | msisadrv
|
|
|
| [ Non-Plug and Play Drivers / NativeWiFi Filter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NativeWiFi Filter
|
|
|
| [ Non-Plug and Play Drivers / NDIS System Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NDIS System Driver
|
|
|
| [ Non-Plug and Play Drivers / NDIS Usermode I/O Protocol ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NDIS Usermode I/O Protocol
|
|
|
| [ Non-Plug and Play Drivers / NDProxy ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NDProxy
|
|
|
| [ Non-Plug and Play Drivers / NETBT ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NETBT
|
|
|
| [ Non-Plug and Play Drivers / NetIO Legacy TDI Support Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NetIO Legacy TDI Support Driver
|
|
|
| [ Non-Plug and Play Drivers / NSI proxy service driver. ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NSI proxy service driver.
|
|
|
| [ Non-Plug and Play Drivers / Null ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Null
|
|
|
| [ Non-Plug and Play Drivers / nvpciflt ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | nvpciflt
|
|
|
| [ Non-Plug and Play Drivers / NvStreamKms ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NvStreamKms
|
|
|
| [ Non-Plug and Play Drivers / OEM-SLP2.1 Driver (HPD64) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | OEM-SLP2.1 Driver (HPD64)
|
|
|
| [ Non-Plug and Play Drivers / PEAUTH ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | PEAUTH
|
|
|
| [ Non-Plug and Play Drivers / Performance Counters for Windows Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Performance Counters for Windows Driver
|
|
|
| [ Non-Plug and Play Drivers / QoS Packet Scheduler ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | QoS Packet Scheduler
|
|
|
| [ Non-Plug and Play Drivers / QWAVE driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | QWAVE driver
|
|
|
| [ Non-Plug and Play Drivers / RDP Encoder Mirror Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | RDP Encoder Mirror Driver
|
|
|
| [ Non-Plug and Play Drivers / RDPCDD ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | RDPCDD
|
|
|
| [ Non-Plug and Play Drivers / Reflector Display Driver used to gain access to graphics data ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Reflector Display Driver used to gain access to graphics data
|
|
|
| [ Non-Plug and Play Drivers / Remote Access IPv6 ARP Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Remote Access IPv6 ARP Driver
|
|
|
| [ Non-Plug and Play Drivers / Security Processor Loader Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Security Processor Loader Driver
|
|
|
| [ Non-Plug and Play Drivers / SSD Device Filter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | SSD Device Filter
|
|
|
| [ Non-Plug and Play Drivers / SSPORT ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | SSPORT
|
|
|
| [ Non-Plug and Play Drivers / System Attribute Cache ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | System Attribute Cache
|
|
|
| [ Non-Plug and Play Drivers / TCP/IP Protocol Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | TCP/IP Protocol Driver
|
|
|
| [ Non-Plug and Play Drivers / TCP/IP Registry Compatibility ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | TCP/IP Registry Compatibility
|
|
|
| [ Non-Plug and Play Drivers / User Mode Driver Frameworks Platform Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | User Mode Driver Frameworks Platform Driver
|
|
|
| [ Non-Plug and Play Drivers / VgaSave ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | VgaSave
|
|
|
| [ Non-Plug and Play Drivers / WFP Lightweight Filter ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | WFP Lightweight Filter
|
|
|
| [ Non-Plug and Play Drivers / Windows Firewall Authorization Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Windows Firewall Authorization Driver
|
|
|
| [ Non-Plug and Play Drivers / Канал IDE ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Канал IDE
|
|
|
| [ Non-Plug and Play Drivers / Тома запоминающих устройств ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Тома запоминающих устройств
|
|
|
| [ Processors / Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Аппаратный ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_60
|
|
|
| | Производитель ЦП:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-4210M
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Processors / Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Аппаратный ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_60
|
|
|
| | Производитель ЦП:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-4210M
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Processors / Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Аппаратный ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_60
|
|
|
| | Производитель ЦП:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-4210M
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Processors / Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Core(TM) i5-4210M CPU @ 2.60GHz
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | cpu.inf
|
| | | INF Section | IntelPPM_Inst.NT
|
| | | Аппаратный ID | ACPI\GenuineIntel_-_Intel64_Family_6_Model_60
|
|
|
| | Производитель ЦП:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://ark.intel.com/search.aspx?q=Intel%20Core%20i5-4210M
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Sound, video and game controllers / NVIDIA Virtual Audio Device (Wave Extensible) (WDM) ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | NVIDIA Virtual Audio Device (Wave Extensible) (WDM)
|
| | | Дата драйвера | 24.11.2014
|
| | | Версия драйвера | 1.2.27.0
|
| | | Поставщик драйвера | NVIDIA
|
| | | INF-файл | oem35.inf
|
| | | INF Section | NVVAD_WaveExtensible64.NT
|
| | | Аппаратный ID | USB\VID_0955&PID_9000
|
|
|
| | Производитель устройства:
|
| | | Фирма | NVIDIA Corporation
|
| | | Информация о продукте | http://www.nvidia.com/page/mobo.html
|
| | | Загрузка драйверов | http://www.nvidia.com/content/drivers/drivers.asp
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Sound, video and game controllers / VIA HD Audio ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | VIA HD Audio
|
| | | Дата драйвера | 05.11.2014
|
| | | Версия драйвера | 6.0.11.600
|
| | | Поставщик драйвера | VIA Technologies, Inc.
|
| | | INF-файл | oem47.inf
|
| | | INF Section | HdAudModel
|
| | | Аппаратный ID | HDAUDIO\FUNC_01&VEN_1106&DEV_8446&SUBSYS_15586705&REV_1000
|
| | | Сведения о размещении | Внутренняя шина High Definition Audio
|
|
|
| | Производитель устройства:
|
| | | Фирма | VIA Technologies, Inc.
|
| | | Информация о продукте | http://www.via.com.tw/en/products/audio
|
| | | Загрузка драйверов | http://www.via.com.tw/en/support/drivers.jsp
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Storage controllers / DAEMON Tools Pro Virtual SCSI Bus ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | DAEMON Tools Pro Virtual SCSI Bus
|
| | | Дата драйвера | 24.09.2015
|
| | | Версия драйвера | 5.28.0.0
|
| | | Поставщик драйвера | Disc Soft Ltd
|
| | | INF-файл | oem54.inf
|
| | | INF Section | DTPROSCSIBUS.NTAMD64
|
| | | Аппаратный ID | root\dtproscsibus
|
|
|
| | Производитель устройства:
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Storage Volumes / Generic volume ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic volume
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Аппаратный ID | STORAGE\Volume
|
|
|
| [ Storage Volumes / Generic volume ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic volume
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Аппаратный ID | STORAGE\Volume
|
|
|
| [ Storage Volumes / Generic volume ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic volume
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | volume.inf
|
| | | INF Section | volume_install.NTAMD64
|
| | | Аппаратный ID | STORAGE\Volume
|
|
|
| [ System devices / ACPI Fixed Feature Button ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI Fixed Feature Button
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\FixedButton
|
|
|
| [ System devices / ACPI Lid ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI Lid
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\PNP0C0D
|
| | | PnP-устройство | Lid
|
|
|
| [ System devices / ACPI Power Button ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI Power Button
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\PNP0C0C
|
| | | PnP-устройство | Power Button
|
|
|
| [ System devices / ACPI Sleep Button ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI Sleep Button
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\PNP0C0E
|
| | | PnP-устройство | Sleep Button
|
|
|
| [ System devices / ACPI Thermal Zone ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | ACPI Thermal Zone
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\ThermalZone
|
|
|
| [ System devices / Composite Bus Enumerator ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Composite Bus Enumerator
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.17514
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | compositebus.inf
|
| | | INF Section | CompositeBus_Device.NT
|
| | | Аппаратный ID | ROOT\CompositeBus
|
|
|
| [ System devices / Direct memory access controller ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Direct memory access controller
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Аппаратный ID | ACPI\PNP0200
|
| | | PnP-устройство | DMA Controller
|
|
|
| | Ресурсы устройств:
|
| | | DMA | 04
|
| | | Порт | 0000-001F
|
| | | Порт | 0081-0091
|
| | | Порт | 0093-009F
|
| | | Порт | 00C0-00DF
|
|
|
| [ System devices / File as Volume Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | File as Volume Driver
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | blbdrive.inf
|
| | | INF Section | blbdrive_device.NT
|
| | | Аппаратный ID | ROOT\BLBDRIVE
|
|
|
| [ System devices / High Definition Audio Controller ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | High Definition Audio Controller
|
| | | Дата драйвера | 25.03.2016
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | hdaudbus.inf
|
| | | INF Section | HDAudio_Device.NT
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C20&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 27, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - High Definition Audio Controller [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 22
|
| | | Память | F7B10000-F7B13FFF
|
|
|
| [ System devices / High precision event timer ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | High precision event timer
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_HPET
|
| | | Аппаратный ID | ACPI\PNP0103
|
| | | PnP-устройство | High Precision Event Timer
|
|
|
| | Ресурсы устройств:
|
| | | Память | FED00000-FED003FF
|
|
|
| [ System devices / Intel(R) 8 Series/C220 Series PCI Express Root Port #1 - 8C10 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series PCI Express Root Port #1 - 8C10
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem39.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C10&SUBSYS_65051558&REV_D5
|
| | | Сведения о размещении | PCI bus 0, device 28, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - PCI Express Root Port 1
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 16
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) 8 Series/C220 Series PCI Express Root Port #2 - 8C12 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series PCI Express Root Port #2 - 8C12
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem39.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C12&SUBSYS_65051558&REV_D5
|
| | | Сведения о размещении | PCI bus 0, device 28, function 1
|
| | | PCI-устройство | Intel Lynx Point PCH - PCI Express Root Port 2
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 17
|
| | | Память | F7A00000-F7AFFFFF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) 8 Series/C220 Series PCI Express Root Port #3 - 8C14 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series PCI Express Root Port #3 - 8C14
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem39.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C14&SUBSYS_65051558&REV_D5
|
| | | Сведения о размещении | PCI bus 0, device 28, function 2
|
| | | PCI-устройство | Intel Lynx Point PCH - PCI Express Root Port 3
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 18
|
| | | Память | F7900000-F79FFFFF
|
| | | Порт | D000-DFFF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) 8 Series/C220 Series PCI Express Root Port #4 - 8C16 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series PCI Express Root Port #4 - 8C16
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem39.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C16&SUBSYS_65051558&REV_D5
|
| | | Сведения о размещении | PCI bus 0, device 28, function 3
|
| | | PCI-устройство | Intel Lynx Point PCH - PCI Express Root Port 4
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 19
|
| | | Память | F7800000-F78FFFFF
|
| | | Порт | C000-CFFF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) 82802 Firmware Hub Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 82802 Firmware Hub Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MEM
|
| | | Аппаратный ID | ACPI\INT0800
|
| | | PnP-устройство | Intel Flash EEPROM
|
|
|
| | Ресурсы устройств:
|
| | | Память | FF000000-FFFFFFFF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) HM86 LPC Controller - 8C49 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) HM86 LPC Controller - 8C49
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem39.inf
|
| | | INF Section | Intel_ISAPNP_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C49&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 31, function 0
|
| | | PCI-устройство | Intel HM86 Chipset - LPC Interface Controller [C-2]
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) Management Engine Interface ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Management Engine Interface
|
| | | Дата драйвера | 13.03.2014
|
| | | Версия драйвера | 10.0.0.1204
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem46.inf
|
| | | INF Section | TEE_DDI_x64
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C3A&SUBSYS_65051558&REV_04
|
| | | Сведения о размещении | PCI bus 0, device 22, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - Host Embedded Controller Interface 1 (HECI1) [C-1]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 65536
|
| | | Память | F7B1E000-F7B1E00F
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor DRAM Controller - 0C04 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor DRAM Controller - 0C04
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem37.inf
|
| | | INF Section | Intel_NO_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_0C04&SUBSYS_65051558&REV_06
|
| | | Сведения о размещении | PCI bus 0, device 0, function 0
|
| | | PCI-устройство | Intel Haswell-MB - Host Bridge/DRAM Controller
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ System devices / Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor PCI Express x16 Controller - 0C01 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) Xeon(R) processor E3-1200 v3/4th Gen Core processor PCI Express x16 Controller - 0C01
|
| | | Дата драйвера | 25.07.2013
|
| | | Версия драйвера | 9.4.0.1023
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem37.inf
|
| | | INF Section | Intel_PCI_DRV
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_0C01&SUBSYS_65051558&REV_06
|
| | | Сведения о размещении | PCI bus 0, device 1, function 0
|
| | | PCI-устройство | Intel Haswell - PCI Express x16 Controller
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 16
|
| | | Память | E0000000-F1FFFFFF
|
| | | Память | F6000000-F70FFFFF
|
| | | Порт | E000-EFFF
|
|
|
| [ System devices / Kaspersky Lab power events provider ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Kaspersky Lab power events provider
|
| | | Дата драйвера | 19.09.2018
|
| | | Версия драйвера | 20.0.68.0
|
| | | Поставщик драйвера | Kaspersky Lab
|
| | | INF-файл | oem72.inf
|
| | | INF Section | klhkInstall
|
| | | Аппаратный ID | ROOT\KLHK
|
|
|
| [ System devices / Microsoft ACPI-Compliant Embedded Controller ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft ACPI-Compliant Embedded Controller
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV
|
| | | Аппаратный ID | ACPI\PNP0C09
|
| | | PnP-устройство | Embedded Controller Device
|
|
|
| | Ресурсы устройств:
|
| | | Порт | 0062-0062
|
| | | Порт | 0066-0066
|
|
|
| [ System devices / Microsoft ACPI-Compliant System ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft ACPI-Compliant System
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | acpi.inf
|
| | | INF Section | ACPI_Inst.NT
|
| | | Аппаратный ID | ACPI_HAL\PNP0C08
|
| | | PnP-устройство | ACPI Driver/BIOS
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 100
|
| | | IRQ | 101
|
| | | IRQ | 102
|
| | | IRQ | 103
|
| | | IRQ | 104
|
| | | IRQ | 105
|
| | | IRQ | 106
|
| | | IRQ | 107
|
| | | IRQ | 108
|
| | | IRQ | 109
|
| | | IRQ | 110
|
| | | IRQ | 111
|
| | | IRQ | 112
|
| | | IRQ | 113
|
| | | IRQ | 114
|
| | | IRQ | 115
|
| | | IRQ | 116
|
| | | IRQ | 117
|
| | | IRQ | 118
|
| | | IRQ | 119
|
| | | IRQ | 120
|
| | | IRQ | 121
|
| | | IRQ | 122
|
| | | IRQ | 123
|
| | | IRQ | 124
|
| | | IRQ | 125
|
| | | IRQ | 126
|
| | | IRQ | 127
|
| | | IRQ | 128
|
| | | IRQ | 129
|
| | | IRQ | 130
|
| | | IRQ | 131
|
| | | IRQ | 132
|
| | | IRQ | 133
|
| | | IRQ | 134
|
| | | IRQ | 135
|
| | | IRQ | 136
|
| | | IRQ | 137
|
| | | IRQ | 138
|
| | | IRQ | 139
|
| | | IRQ | 140
|
| | | IRQ | 141
|
| | | IRQ | 142
|
| | | IRQ | 143
|
| | | IRQ | 144
|
| | | IRQ | 145
|
| | | IRQ | 146
|
| | | IRQ | 147
|
| | | IRQ | 148
|
| | | IRQ | 149
|
| | | IRQ | 150
|
| | | IRQ | 151
|
| | | IRQ | 152
|
| | | IRQ | 153
|
| | | IRQ | 154
|
| | | IRQ | 155
|
| | | IRQ | 156
|
| | | IRQ | 157
|
| | | IRQ | 158
|
| | | IRQ | 159
|
| | | IRQ | 160
|
| | | IRQ | 161
|
| | | IRQ | 162
|
| | | IRQ | 163
|
| | | IRQ | 164
|
| | | IRQ | 165
|
| | | IRQ | 166
|
| | | IRQ | 167
|
| | | IRQ | 168
|
| | | IRQ | 169
|
| | | IRQ | 170
|
| | | IRQ | 171
|
| | | IRQ | 172
|
| | | IRQ | 173
|
| | | IRQ | 174
|
| | | IRQ | 175
|
| | | IRQ | 176
|
| | | IRQ | 177
|
| | | IRQ | 178
|
| | | IRQ | 179
|
| | | IRQ | 180
|
| | | IRQ | 181
|
| | | IRQ | 182
|
| | | IRQ | 183
|
| | | IRQ | 184
|
| | | IRQ | 185
|
| | | IRQ | 186
|
| | | IRQ | 187
|
| | | IRQ | 188
|
| | | IRQ | 189
|
| | | IRQ | 190
|
| | | IRQ | 81
|
| | | IRQ | 82
|
| | | IRQ | 83
|
| | | IRQ | 84
|
| | | IRQ | 85
|
| | | IRQ | 86
|
| | | IRQ | 87
|
| | | IRQ | 88
|
| | | IRQ | 89
|
| | | IRQ | 90
|
| | | IRQ | 91
|
| | | IRQ | 92
|
| | | IRQ | 93
|
| | | IRQ | 94
|
| | | IRQ | 95
|
| | | IRQ | 96
|
| | | IRQ | 97
|
| | | IRQ | 98
|
| | | IRQ | 99
|
|
|
| [ System devices / Microsoft System Management BIOS Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft System Management BIOS Driver
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | MSSMBIOS_DRV
|
| | | Аппаратный ID | ROOT\mssmbios
|
|
|
| [ System devices / Microsoft Virtual Drive Enumerator Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft Virtual Drive Enumerator Driver
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | VDRVROOT
|
| | | Аппаратный ID | ROOT\vdrvroot
|
|
|
| [ System devices / Microsoft Windows Management Interface for ACPI ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft Windows Management Interface for ACPI
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | acpi.inf
|
| | | INF Section | WMIMAP_Inst.NT
|
| | | Аппаратный ID | ACPI\PNP0C14
|
| | | PnP-устройство | Microsoft Windows Management Interface for ACPI
|
|
|
| [ System devices / Microsoft Windows Management Interface for ACPI ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Microsoft Windows Management Interface for ACPI
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | acpi.inf
|
| | | INF Section | WMIMAP_Inst.NT
|
| | | Аппаратный ID | ACPI\PNP0C14
|
| | | PnP-устройство | Microsoft Windows Management Interface for ACPI
|
|
|
| [ System devices / Motherboard resources ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Motherboard resources
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\INT340E
|
| | | PnP-устройство | Intel System Device
|
|
|
| [ System devices / Motherboard resources ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Motherboard resources
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\PNP0C02
|
| | | PnP-устройство | Thermal Monitoring ACPI Device
|
|
|
| | Ресурсы устройств:
|
| | | Память | F7FD0000-F7FDFFFF
|
| | | Память | F7FEE000-F7FEEFFF
|
| | | Память | F8000000-FBFFFFFF
|
| | | Память | FED10000-FED17FFF
|
| | | Память | FED18000-FED18FFF
|
| | | Память | FED19000-FED19FFF
|
| | | Память | FED1C000-FED1FFFF
|
| | | Память | FED20000-FED3FFFF
|
| | | Память | FED45000-FED8FFFF
|
| | | Память | FED90000-FED93FFF
|
| | | Память | FEE00000-FEEFFFFF
|
| | | Память | FF000000-FFFFFFFF
|
|
|
| [ System devices / Motherboard resources ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Motherboard resources
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\INT3F0D
|
| | | PnP-устройство | Intel Watchdog Timer
|
|
|
| | Ресурсы устройств:
|
| | | Порт | 1854-1857
|
|
|
| [ System devices / Motherboard resources ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Motherboard resources
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\PNP0C02
|
| | | PnP-устройство | Thermal Monitoring ACPI Device
|
|
|
| | Ресурсы устройств:
|
| | | Порт | 002E-002F
|
| | | Порт | 004E-004F
|
| | | Порт | 0061-0061
|
| | | Порт | 0063-0063
|
| | | Порт | 0065-0065
|
| | | Порт | 0067-0067
|
| | | Порт | 0068-0068
|
| | | Порт | 006C-006C
|
| | | Порт | 0070-0070
|
| | | Порт | 0080-0080
|
| | | Порт | 0092-0092
|
| | | Порт | 00B2-00B3
|
| | | Порт | 0680-069F
|
| | | Порт | 164E-164F
|
| | | Порт | 1800-18FE
|
| | | Порт | 1C00-1CFE
|
| | | Порт | 1D00-1DFE
|
| | | Порт | 1E00-1EFE
|
| | | Порт | 1F00-1FFE
|
| | | Порт | 3322-3323
|
| | | Порт | FFFF-FFFF
|
| | | Порт | FFFF-FFFF
|
| | | Порт | FFFF-FFFF
|
|
|
| [ System devices / Motherboard resources ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Motherboard resources
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\PNP0C02
|
| | | PnP-устройство | Thermal Monitoring ACPI Device
|
|
|
| | Ресурсы устройств:
|
| | | Порт | 0010-001F
|
| | | Порт | 0022-003F
|
| | | Порт | 0044-005F
|
| | | Порт | 0072-007F
|
| | | Порт | 0080-0080
|
| | | Порт | 0084-0086
|
| | | Порт | 0088-0088
|
| | | Порт | 008C-008E
|
| | | Порт | 0090-009F
|
| | | Порт | 00A2-00BF
|
| | | Порт | 00E0-00EF
|
| | | Порт | 04D0-04D1
|
|
|
| [ System devices / Numeric data processor ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Numeric data processor
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Аппаратный ID | ACPI\PNP0C04
|
| | | PnP-устройство | Numeric Data Processor
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 13
|
| | | Порт | 00F0-00F0
|
|
|
| [ System devices / Plug and Play Software Device Enumerator ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Plug and Play Software Device Enumerator
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | SWENUM
|
| | | Аппаратный ID | root\swenum
|
|
|
| [ System devices / Programmable interrupt controller ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Programmable interrupt controller
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_PIC
|
| | | Аппаратный ID | ACPI\PNP0000
|
| | | PnP-устройство | Programmable Interrupt Controller
|
|
|
| | Ресурсы устройств:
|
| | | Порт | 0020-0021
|
| | | Порт | 0024-0025
|
| | | Порт | 0028-0029
|
| | | Порт | 002C-002D
|
| | | Порт | 0030-0031
|
| | | Порт | 0034-0035
|
| | | Порт | 0038-0039
|
| | | Порт | 003C-003D
|
| | | Порт | 00A0-00A1
|
| | | Порт | 00A4-00A5
|
| | | Порт | 00A8-00A9
|
| | | Порт | 00AC-00AD
|
| | | Порт | 00B0-00B1
|
| | | Порт | 00B4-00B5
|
| | | Порт | 00B8-00B9
|
| | | Порт | 00BC-00BD
|
| | | Порт | 04D0-04D1
|
|
|
| [ System devices / Remote Desktop Device Redirector Bus ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Remote Desktop Device Redirector Bus
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7600.16385
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | rdpbus.inf
|
| | | INF Section | RDPBUS
|
| | | Аппаратный ID | ROOT\RDPBUS
|
|
|
| [ System devices / Synaptics SMBus Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Synaptics SMBus Driver
|
| | | Дата драйвера | 20.12.2013
|
| | | Версия драйвера | 18.0.5.0
|
| | | Поставщик драйвера | Synaptics
|
| | | INF-файл | oem44.inf
|
| | | INF Section | SynapticsInstallIntel
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C22&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 31, function 3
|
| | | PCI-устройство | Intel Lynx Point PCH - SMBus Controller [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 18
|
| | | Память | F7B19000-F7B190FF
|
| | | Порт | F040-F05F
|
|
|
| [ System devices / System board ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | System board
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_MBRES
|
| | | Аппаратный ID | ACPI\PNP0C01
|
| | | PnP-устройство | System Board Extension
|
|
|
| | Ресурсы устройств:
|
| | | Память | FED40000-FED44FFF
|
|
|
| [ System devices / System CMOS/real time clock ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | System CMOS/real time clock
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Аппаратный ID | ACPI\PNP0B00
|
| | | PnP-устройство | Real-Time Clock
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 08
|
| | | Порт | 0070-0077
|
|
|
| [ System devices / System timer ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | System timer
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | NO_DRV_X
|
| | | Аппаратный ID | ACPI\PNP0100
|
| | | PnP-устройство | System Timer
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 00
|
| | | Порт | 0040-0043
|
| | | Порт | 0050-0053
|
|
|
| [ System devices / Terminal Server Keyboard Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Terminal Server Keyboard Driver
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | RDP_KBD
|
| | | Аппаратный ID | ROOT\RDP_KBD
|
|
|
| [ System devices / Terminal Server Mouse Driver ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Terminal Server Mouse Driver
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | RDP_MOU
|
| | | Аппаратный ID | ROOT\RDP_MOU
|
|
|
| [ System devices / UMBus Enumerator ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | UMBus Enumerator
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | umbus.inf
|
| | | INF Section | UmBus_Device.NT
|
| | | Аппаратный ID | UMB\UMBUS
|
|
|
| [ System devices / UMBus Root Bus Enumerator ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | UMBus Root Bus Enumerator
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | umbus.inf
|
| | | INF Section | UmBusRoot_Device.NT
|
| | | Аппаратный ID | root\umbus
|
|
|
| [ System devices / Volume Manager ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Volume Manager
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23403
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | machine.inf
|
| | | INF Section | Volmgr
|
| | | Аппаратный ID | ROOT\VOLMGR
|
|
|
| [ System devices / Шина PCI ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Шина PCI
|
| | | Дата драйвера | 11.05.2017
|
| | | Версия драйвера | 5.0.4.43
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem17.inf
|
| | | INF Section | HCSwitch.NT
|
| | | Аппаратный ID | ACPI\PNP0A08
|
| | | PnP-устройство | ACPI Three-wire Device Bus
|
|
|
| | Ресурсы устройств:
|
| | | Память | 000A0000-000BFFFF
|
| | | Память | 000D4000-000D7FFF
|
| | | Память | 000D8000-000DBFFF
|
| | | Память | 000DC000-000DFFFF
|
| | | Память | 000E0000-000E3FFF
|
| | | Память | 000E4000-000E7FFF
|
| | | Память | CF200000-FEAFFFFF
|
| | | Порт | 0000-0CF7
|
| | | Порт | 0D00-FFFF
|
|
|
| [ Universal Serial Bus controllers / Generic USB Hub ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic USB Hub
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23933
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | usb.inf
|
| | | INF Section | StandardHub.Dev.NT
|
| | | Аппаратный ID | USB\VID_8087&PID_8000&REV_0005
|
| | | Сведения о размещении | Port_#0001.Hub_#0002
|
|
|
| [ Universal Serial Bus controllers / Generic USB Hub ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Generic USB Hub
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23933
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | usb.inf
|
| | | INF Section | StandardHub.Dev.NT
|
| | | Аппаратный ID | USB\VID_8087&PID_8008&REV_0005
|
| | | Сведения о размещении | Port_#0001.Hub_#0001
|
|
|
| [ Universal Serial Bus controllers / Intel(R) 8 Series/C220 Series USB EHCI #1 - 8C26 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series USB EHCI #1 - 8C26
|
| | | Дата драйвера | 31.07.2013
|
| | | Версия драйвера | 9.4.0.1025
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem41.inf
|
| | | INF Section | Intel_EHCI.Dev.NT
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C26&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 29, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - USB 2.0 EHCI Host Controller 1 [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 23
|
| | | Память | F7B1B000-F7B1B3FF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Universal Serial Bus controllers / Intel(R) 8 Series/C220 Series USB EHCI #2 - 8C2D ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Intel(R) 8 Series/C220 Series USB EHCI #2 - 8C2D
|
| | | Дата драйвера | 31.07.2013
|
| | | Версия драйвера | 9.4.0.1025
|
| | | Поставщик драйвера | Intel
|
| | | INF-файл | oem41.inf
|
| | | INF Section | Intel_EHCI.Dev.NT
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C2D&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 26, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - USB 2.0 EHCI Host Controller 2 [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 16
|
| | | Память | F7B1C000-F7B1C3FF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Universal Serial Bus controllers / USB Composite Device ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | USB Composite Device
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23933
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | usb.inf
|
| | | INF Section | Composite.Dev.NT
|
| | | Аппаратный ID | USB\VID_09DA&PID_9090&REV_0103
|
| | | Сведения о размещении | Port_#0002.Hub_#0001
|
|
|
| [ Universal Serial Bus controllers / USB Root Hub ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | USB Root Hub
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23933
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | usbport.inf
|
| | | INF Section | ROOTHUB.Dev.NT
|
| | | Аппаратный ID | USB\ROOT_HUB20&VID8086&PID8C2D&REV0005
|
|
|
| [ Universal Serial Bus controllers / USB Root Hub ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | USB Root Hub
|
| | | Дата драйвера | 21.06.2006
|
| | | Версия драйвера | 6.1.7601.23933
|
| | | Поставщик драйвера | Microsoft
|
| | | INF-файл | usbport.inf
|
| | | INF Section | ROOTHUB.Dev.NT
|
| | | Аппаратный ID | USB\ROOT_HUB20&VID8086&PID8C26&REV0005
|
|
|
| [ Universal Serial Bus controllers / Корневой концентратор Intel(R) USB 3.0 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Корневой концентратор Intel(R) USB 3.0
|
| | | Дата драйвера | 11.05.2017
|
| | | Версия драйвера | 5.0.4.43
|
| | | Поставщик драйвера | Intel(R) Corporation
|
| | | INF-файл | oem16.inf
|
| | | INF Section | IUsb3HubModel
|
| | | Аппаратный ID | IUSB3\ROOT_HUB30&VID_8086&PID_8C31&REV_0005&SID_65051558
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
|
|
| [ Universal Serial Bus controllers / Расширяемый хост-контроллер Intel(R) USB 3.0 ]
|
|
|
| | Свойства устройства:
|
| | | Описание драйвера | Расширяемый хост-контроллер Intel(R) USB 3.0
|
| | | Дата драйвера | 11.05.2017
|
| | | Версия драйвера | 5.0.4.43
|
| | | Поставщик драйвера | Intel(R) Corporation
|
| | | INF-файл | oem15.inf
|
| | | INF Section | IUsb3XhcModel
|
| | | Аппаратный ID | PCI\VEN_8086&DEV_8C31&SUBSYS_65051558&REV_05
|
| | | Сведения о размещении | PCI bus 0, device 20, function 0
|
| | | PCI-устройство | Intel Lynx Point PCH - USB 3.0 xHCI Host Controller [C-2]
|
|
|
| | Ресурсы устройств:
|
| | | IRQ | 524288
|
| | | Память | F7B00000-F7B0FFFF
|
|
|
| | Производитель чипсета:
|
| | | Фирма | Intel Corporation
|
| | | Информация о продукте | http://www.intel.com/products/chipsets
|
| | | Загрузка драйверов | http://support.intel.com/support/chipsets
|
| | | Модернизации BIOS | http://www.aida64.com/bios-updates
|
| | | Обновление драйверов | http://www.aida64.com/driver-updates
|
| | | | | | | |
|
| | Программа | Версия | Размер | GUID | Издатель | Дата
|
| | µTorrent | 1.8.5 | Неизвестно | uTorrent | |
|
| | Adobe Acrobat Reader DC MUI | 18.011.20038 | Неизвестно | {AC76BA86-7AD7-FFFF-7B44-AC0F074E4100} | Adobe Systems Incorporated | 2018-04-04
|
| | Adobe Flash Player 32 PPAPI | 32.0.0.114 | Неизвестно | Adobe Flash Player PPAPI | Adobe Systems Incorporated |
|
| | Adobe Flash Player 9 ActiveX | 9.0.16.0 | Неизвестно | {BB65C393-C76E-4F06-9B0C-2124AA8AF97B} | Adobe Systems, Inc. | 2018-04-05
|
| | Adobe Photoshop CC 2018 | 19.1.2 | Неизвестно | {D92D92CB-9163-871B-B3EC-B2704B1B20D2} | Adobe Systems Incorporated |
|
| | Adobe Refresh Manager | 1.8.0 | Неизвестно | {AC76BA86-0804-1033-1959-001824298644} | Adobe Systems Incorporated | 2018-09-20
|
| | AIDA64 Extreme v5.97 | 5.97 | Неизвестно | AIDA64 Extreme_is1 | FinalWire Ltd. | 2018-04-04
|
| | AIMP3 | v3.50.1277, 19.06.2013 | Неизвестно | AIMP3 | AIMP DevTeam | 2018-04-05
|
| | Airplane Mode Hid Installer | 2.0.0.6 | Неизвестно | InstallShield_{5E5B067F-52A4-447E-A3F1-D6DD10565E73} | | 2018-04-02
|
| | Anki | | Неизвестно | Anki | |
|
| | AutoCAD 2008 - Русский [russian (russia)] | 17.1.219.0 | Неизвестно | {5783F2D7-6001-0419-0002-0060B0CE6BBA} | Autodesk | 2018-04-05
|
| | AutoCAD 2008 - Русский SP1 | 1 | Неизвестно | AutoCAD 2008 - Русский SP1 | Autodesk |
|
| | AutoCAD 2008 - Русский | 17.1.219.0 | Неизвестно | AutoCAD 2008 - Русский | Autodesk |
|
| | AutoCAD 2015 VBA Enabler | 20.0.51.0 | Неизвестно | {FD0595A7-C560-4967-0133-ADCE7EE7644D} | Autodesk | 2018-04-05
|
| | Autodesk 3ds Max 2018 SDK | 20.0.0.966 | Неизвестно | {612902D4-45AC-44AD-BA9B-58DC67A1F315} | Autodesk | 2018-06-13
|
| | Autodesk 3ds Max 2018 | 20.0.0.966 | Неизвестно | {52B37EC7-D836-0410-0764-3C24BCED2010} | Autodesk | 2018-06-13
|
| | Autodesk Advanced Material Library Image Library 2018 | 16.11.1.0 | Неизвестно | {177AD7F6-9C77-4E50-BA53-B7259C5F282D} | Autodesk | 2018-06-13
|
| | Autodesk App Manager [russian (russia)] | 1.2.0 | Неизвестно | {C8125548-F2D5-4059-823F-1F3C5BBD9F19} | Autodesk | 2018-04-05
|
| | Autodesk AutoCAD 2015 VBA Enabler | 20.0.51.0 | Неизвестно | AutoCAD 2015 VBA Enabler | Autodesk | 05.04.2018
|
| | Autodesk AutoCAD Civil 3D 2015 - Russian [russian (russia)] | 10.4.524.0 | Неизвестно | {5783F2D7-E000-0419-2102-0060B0CE6BBA} | Autodesk | 2018-04-05
|
| | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP1 | 1 | Неизвестно | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP1 | Autodesk |
|
| | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP2 | 10.4.922.0 | Неизвестно | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP2 | Autodesk |
|
| | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP3 | 10.4.922.0 | Неизвестно | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) SP3 | Autodesk |
|
| | Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) | 10.4.922.0 | Неизвестно | {5783F2D7-E000-0000-0102-0060B0CE6BBA} | Autodesk | 2018-04-16
|
| | Autodesk AutoCAD Civil 3D 2015 32 Bit Object Enabler on Autodesk Storm and Sanitary Analysis 2015 - Language Neutral | 524.0 | Неизвестно | {B9052A24-D270-4C71-8604-E8EA776411DA} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk AutoCAD Performance Feedback Tool Version 1.2.2 | 1.2.2.0 | Неизвестно | {85735431-6CD3-4B16-BEC8-95332034E53B} | Autodesk | 2018-04-05
|
| | Autodesk Backburner 2018.0 | 18.0.0.0 | Неизвестно | {0038F5AA-8482-4BB2-8A28-3FEA1D58D78A} | Autodesk | 2018-06-13
|
| | Autodesk CAD Manager Tools [russian (russia)] | 16.0.0.65 | Неизвестно | {5783F2D7-0111-0409-0110-0060B0CE6BBA} | Autodesk | 2018-04-05
|
| | Autodesk Cartogramma Utility 2015 on Autodesk AutoCAD Civil 3D 2015 - Russian - Russian | 7.7.1.0 | Неизвестно | {83C57BFE-B989-428D-A772-69F262603F8B} | Autodesk | 2018-04-15
|
| | Autodesk Certificate Package (x64) - 5.1.4 | 5.1.4.100 | Неизвестно | {79D5E475-5EAB-4474-84F5-BD612337A175} | Autodesk | 2018-06-13
|
| | Autodesk Civil View for 3ds Max 2018 64-bit | 20.0.0.0 | Неизвестно | {51C8EDF7-FFDA-430A-8B5E-1895FF14ACB7} | Autodesk | 2018-06-13
|
| | Autodesk Content Service Language Pack [russian (russia)] | 3.2.0.0 | Неизвестно | {A37CDB58-AAE8-0001-8C13-E0F7BACB0D5F} | Autodesk | 2018-04-05
|
| | Autodesk Content Service | 3.2.0.0 | Неизвестно | Autodesk Content Service | Autodesk | 05.04.2018
|
| | Autodesk DWF Viewer 7 | 7.2.0 | Неизвестно | {9A346205-EA92-4406-B1AB-50379DA3F057} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk Inventor Server Engine for 3ds Max 2018 | 20.0 | Неизвестно | {1984E20A-184B-4073-87F4-6755F3EE5769} | Autodesk | 2018-06-13
|
| | Autodesk License Service (x64) - 5.1.4 | 5.1.4.0 | Неизвестно | {3609A8D9-FC0C-4C9B-9F58-0B1D1A4FE556} | Autodesk | 2018-06-13
|
| | Autodesk Material Library 2015 | 5.2.9.100 | Неизвестно | {427F733F-4D6C-45BC-9324-EB743104C321} | Autodesk | 2018-04-05
|
| | Autodesk Material Library 2018 | 16.11.1.0 | Неизвестно | {7847611E-92E9-4917-B395-71C91D523104} | Autodesk | 2018-06-13
|
| | Autodesk Material Library Base Resolution Image Library 2015 | 5.2.9.100 | Неизвестно | {ABE2F70B-8D94-44E9-AA04-F0DB35063D62} | Autodesk | 2018-04-05
|
| | Autodesk Material Library Base Resolution Image Library 2018 | 16.11.1.0 | Неизвестно | {FCDED119-A969-4E48-8A32-D21AD6B03253} | Autodesk | 2018-06-13
|
| | Autodesk Material Library Medium Resolution Image Library 2018 | 16.11.1.0 | Неизвестно | {6EC5DA32-D02D-47D4-A3C4-988C1BC1A5FE} | Autodesk | 2018-06-13
|
| | Autodesk ReCap | 1.4.2.2 | Неизвестно | Autodesk ReCap | Autodesk | 05.04.2018
|
| | Autodesk Revit Interoperability for 3ds Max 2018 | 18.0.0.412 | Неизвестно | {0BB716E0-1800-0610-0000-097DC2F354DF} | Autodesk | 2018-06-13
|
| | Autodesk Storm and Sanitary Analysis 2015 x64 Plug-in | 9.1.140 | Неизвестно | {70326DC6-6585-47FA-A08E-773D31B6EC08} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk Storm and Sanitary Analysis 2015 | 9.1.157 | Неизвестно | {36A89146-A453-48A1-82C2-922CD6DBFD35} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk Subassembly Composer on Autodesk AutoCAD Civil 3D 2015 - Russian - Language Neutral | 524.0 | Неизвестно | {1A3C0D40-B933-4EF7-82C6-35C9A673FFB3} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk Subassembly Composer on Autodesk AutoCAD Civil 3D 2015 - Russian - Russian | 524.0 | Неизвестно | {3E089378-FE14-497C-9F09-EF77F3C1F951} | Autodesk, Inc. | 2018-04-05
|
| | Autodesk Справка по AutoCAD Civil 3D 2015 - Русская | 10.4.532.0 | Неизвестно | Справка по AutoCAD Civil 3D 2015 - Русская | Autodesk |
|
| | Canon LBP3010/LBP3018/LBP3050 | | Неизвестно | Canon LBP3010/LBP3018/LBP3050 | |
|
| | CCleaner | 5.44 | Неизвестно | CCleaner | Piriform |
|
| | Credo_DAT [russian (russia)] | 3.00.0002 | Неизвестно | {EB5F5578-1D86-4DF1-84CD-8D69C96EB3F4} | Credo-Dialogue | 2018-04-05
|
| | DAEMON Tools Pro | 8.2.1.0709 | Неизвестно | DAEMON Tools Pro | Disc Soft Ltd |
|
| | Definition Update for Microsoft Office 2016 (KB3115407) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{3DBF9257-2612-4385-BCE3-E9D4C41CC8CB} | Microsoft |
|
| | Dota 2 | | Неизвестно | Steam App 570 | Valve |
|
| | Flashtool | 0.9.25.0 | Неизвестно | Flashtool | Androxyde |
|
| | Guardant driver | | Неизвестно | Guardant driver | |
|
| | Herramientas de correccion de Microsoft Office 2016: espanol [spanish (spain, international sort)] | 16.0.4266.1001 | Неизвестно | {90160000-001F-0C0A-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Hotkey 3.16.29 [english] | 3.16.29 | Неизвестно | {2F385B5D-5F23-4513-B3CE-9F5E4F4B882A} | | 2018-04-02
|
| | Intel(R) Management Engine Components | 1.0.0.0 | Неизвестно | {E1CBE9A2-1323-488E-9F3B-736DF6399F38} | Intel Corporation | 2018-04-02
|
| | Intel(R) Management Engine Components | 10.0.0.1204 | Неизвестно | {D4FC649C-0247-4873-930D-D9E6904DCAF5} | Intel Corporation | 2018-04-02
|
| | Intel(R) Processor Graphics | 10.18.10.4013 | Неизвестно | {F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA} | Intel Corporation |
|
| | Intel® Trusted Connect Service Client | 1.35.127.1 | Неизвестно | {3DE97849-544D-4D68-9255-11DF6F9F10D8} | Intel Corporation | 2018-04-02
|
| | Kaspersky Anti-Virus [russian (russia)] | 19.0.0.1088 | Неизвестно | {718613F4-492D-4272-ACC3-D04A8EF0F883} | Лаборатория Касперского | 2018-12-25
|
| | Kaspersky Anti-Virus | 19.0.0.1088 | Неизвестно | InstallWIX_{718613F4-492D-4272-ACC3-D04A8EF0F883} | Лаборатория Касперского |
|
| | Kaspersky Secure Connection [russian (russia)] | 18.0.0.405 | Неизвестно | {F33C0717-8E04-4EB5-90C8-47221287DB4F} | Лаборатория Касперского | 2018-07-24
|
| | Kaspersky Secure Connection | 18.0.0.405 | Неизвестно | InstallWIX_{F33C0717-8E04-4EB5-90C8-47221287DB4F} | Лаборатория Касперского |
|
| | K-Lite Codec Pack 14.0.5 Full | 14.0.5 | Неизвестно | KLiteCodecPack_is1 | KLCP | 2018-04-05
|
| | MAXtoA for 3ds Max 2018 | 1.0.712.0 | Неизвестно | {471069C7-09E2-4289-8EB7-852237FD867E} | Solid Angle | 2018-06-13
|
| | Microsoft .NET Framework 4.6 | 4.6.00081 | Неизвестно | {94A631D5-B30A-3DD8-B65C-1117C09DA73E} | Microsoft Corporation | 2018-06-13
|
| | Microsoft Excel MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-0016-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Excel MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-0016-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Groove MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00BA-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Groove MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-00BA-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office 32-bit Components 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Korrekturhilfen 2016 – Deutsch [german (germany)] | 16.0.4266.1001 | Неизвестно | {90160000-001F-0407-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office OSM MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00E1-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office OSM MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-00E1-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office OSM UX MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00E2-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office OSM UX MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-00E2-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Proofing (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-002C-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Proofing (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-002C-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Proofing Tools 2016 - English | 16.0.4266.1001 | Неизвестно | {90160000-001F-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Shared 32-bit MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00C1-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Shared 32-bit MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-00C1-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Shared MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-006E-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Shared MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-006E-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Shared Setup Metadata MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-0115-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office Standard 2016 | 16.0.4266.1001 | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Office стандартный 2016 | 16.0.4266.1001 | Неизвестно | Office16.STANDARD | Microsoft Corporation |
|
| | Microsoft OneNote MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-00A1-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft OneNote MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-00A1-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Outlook MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-001A-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Outlook MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-001A-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft PowerPoint MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-0018-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft PowerPoint MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-0018-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Publisher MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-0019-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Publisher MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-0019-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft SQL Server Compact 4.0 SP1 x64 ENU | 4.0.8876.1 | Неизвестно | {78909610-D229-459C-A936-25D92283D3FD} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Visual Basic for Applications 7.1 (x64) English | 7.1.0.0 | Неизвестно | {90F60409-7000-11D3-8CFE-0150048383C9} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Visual Basic for Applications 7.1 (x64) | 7.1.00.00 | Неизвестно | {90120064-0070-0000-0000-4000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Visual Basic PowerPacks 10.0 | 10.0.20911 | Неизвестно | {2D9F8079-7D50-3EFD-B3BD-ED642E4EE756} | Microsoft | 2018-04-05
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.50727.4053 False | 8.0.50727.4053 | Неизвестно | {B6E3757B-5E77-3915-866A-CCFC4B8D194C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.50727.42 False | 8.0.50727.42 | Неизвестно | {6E8E85E8-CE4B-4FF5-91F7-04999C9FAE6A} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.51011 False | 8.0.51011 | Неизвестно | {aac9fcc4-dd9e-4add-901c-b5496a07ab2e} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.56336 False | 8.0.56336 | Неизвестно | {071c9b48-7c32-4621-a0ac-3f809523288f} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.57102 False | 8.0.57102 | Неизвестно | {f0cbd694-71ce-4391-9690-5da93b2f0445} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.58298 False | 8.0.58298 | Неизвестно | {f45b48a7-f616-4211-b927-17cab6a96613} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.59192 False | 8.0.59192 | Неизвестно | {6ce5bae9-d3ca-4b99-891a-1dc6c118a5fc} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x64 8.0.61000 | 8.0.61000 | Неизвестно | {ad8a2fa1-06e7-4b0d-927d-6e54b3d31028} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.50727.4053 False | 8.0.50727.4053 | Неизвестно | {770657D0-A123-3C07-8E44-1C83EC895118} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.50727.42 False | 8.0.50727.42 | Неизвестно | {A49F249F-0C91-497F-86DF-B2585E8E76B7} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.51011 False | 8.0.51011 | Неизвестно | {a0fe116e-9a8a-466f-aee0-625cb7c207e3} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.56336 False | 8.0.56336 | Неизвестно | {7299052b-02a4-4627-81f2-1818da5d550d} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.57103 False | 8.0.57103 | Неизвестно | {d8fea624-4f2c-432d-9a54-6eee9cd1a77e} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.58299 False | 8.0.58299 | Неизвестно | {052bac4a-6f79-46d4-a024-1ce1b4f73cd4} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.59193 False | 8.0.59193 | Неизвестно | {837b34e3-7c30-493c-8f6a-2b0f04e2912c} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2005 Redistributable - x86 8.0.61001 | 8.0.61001 | Неизвестно | {710f4c1c-cc18-4c49-8cbf-51240c89a1a2} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022 False | 9.0.21022 | Неизвестно | {350AA351-21FA-3270-8B7A-835434E766AD} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022.0 False [russian (russia)] | 9.0.21022 | Неизвестно | {D04659D1-EB2D-3DE5-A833-837A623CCCF7} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022.218 False | 9.0.21022.218 | Неизвестно | {BBBE35B2-9349-3C48-BD3D-F574B17C7924} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30411 False | 9.0.30411 | Неизвестно | {D93AC9C8-B6CF-391E-BD2F-48AF4727476C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729 False | 9.0.30729 | Неизвестно | {4FFA2088-8317-3B14-93CD-4C699DB37843} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.0 False [russian (russia)] | 9.0.30729 | Неизвестно | {2DFD8316-9EF1-3210-908C-4CB61961C1AC} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 False | 9.0.30729 | Неизвестно | {8220EEFE-38CD-377E-8595-13398D740ACE} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4048 False | 9.0.30729.4048 | Неизвестно | {91415F19-4C22-3609-A105-92ED3522D83C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148 False | 9.0.30729.4148 | Неизвестно | {4B6C7001-C7D6-3710-913E-5BC23FCE91E6} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148.0 False | 9.0.30729.4148 | Неизвестно | {EE936C7A-EA40-31D5-9B65-8E3E089C3828} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.5570 False | 9.0.30729.5570 | Неизвестно | {8338783A-0968-3B85-AFC7-BAAE0A63DC50} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 | 9.0.30729.6161 | Неизвестно | {5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 False | 9.0.21022 | Неизвестно | {FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022.0 False [russian (russia)] | 9.0.21022 | Неизвестно | {DCB46B42-723F-350E-B18A-449BC6C21636} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022.218 False | 9.0.21022.218 | Неизвестно | {E503B4BF-F7BB-3D5F-8BC8-F694B1CFF942} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30411 False | 9.0.30411 | Неизвестно | {5DA8F6CD-C70E-39D8-8430-3D9808D6BD17} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 False | 9.0.30729 | Неизвестно | {3C3D696B-0DB7-3C6D-A356-3DB8CE541918} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.0 False [russian (russia)] | 9.0.30729 | Неизвестно | {527BBE2F-1FED-3D8B-91CB-4DB0F838E69E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 False | 9.0.30729 | Неизвестно | {9A25302D-30C0-39D9-BD6F-21E6EC160475} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4048 False | 9.0.30729.4048 | Неизвестно | {5B1F2843-B379-3FF2-B0D3-64DD143ED53A} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 False | 9.0.30729.4148 | Неизвестно | {1F1C2DFC-2D24-3E06-BCB8-725134ADF989} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148.0 False | 9.0.30729.4148 | Неизвестно | {002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.5570 False | 9.0.30729.5570 | Неизвестно | {86CE85E6-DBAC-3FFD-B977-E4B79F83C909} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 | 9.0.30729.6161 | Неизвестно | {9BE518E6-ECC6-35A9-88E4-87755C07200F} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2010 Redistributable - x64 10.0.30319 False | 10.0.30319 | Неизвестно | {DA5E371C-6333-3D8A-93A4-6FD5B20BCC6E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2010 Redistributable - x64 10.0.40219 | 10.0.40219 | Неизвестно | {1D8E6291-B0D5-35EC-8441-6616F567A0F7} | Microsoft Corporation | 2018-05-06
|
| | Microsoft Visual C++ 2010 Redistributable - x86 10.0.30319 False | 10.0.30319 | Неизвестно | {196BB40D-1578-3D01-B289-BEFC77A11A1E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2010 Redistributable - x86 10.0.40219 | 10.0.40219 | Неизвестно | {F0C3E5D1-1ADE-321E-8167-68EF0DE699A5} | Microsoft Corporation | 2018-05-06
|
| | Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 False Eng | 11.0.61030.0 | Неизвестно | {ca67548a-5ebe-413a-b50c-4b9ceb6d66c6} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 | 11.0.61030.0 | Неизвестно | {a2199617-3609-410f-a8e8-e8806c73545b} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 False Eng | 11.0.61030.0 | Неизвестно | {33d1fd90-4274-48a1-9bc1-97e33d9c2d6f} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 | 11.0.61030.0 | Неизвестно | {f0080ca2-80ae-4958-b6eb-e8fa916d744a} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727 False | 11.0.50727 | Неизвестно | {AC53FC8B-EE18-3F9C-9B59-60937D0B182C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.51106 False | 11.0.51106 | Неизвестно | {3C28BFD4-90C7-3138-87EF-418DC16E9598} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.60610 False | 11.0.60610 | Неизвестно | {764384C5-BCA9-307C-9AAC-FD443662686A} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 | 11.0.61030 | Неизвестно | {37B8F9C7-03FB-3253-8781-2517C99D7C00} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727 False | 11.0.50727 | Неизвестно | {A2CB1ACB-94A2-32BA-A15E-7D80319F7589} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.51106 False | 11.0.51106 | Неизвестно | {5AF4E09F-5C9B-3AAF-B731-544D3DC821DD} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.60610 False | 11.0.60610 | Неизвестно | {2EDC2FA3-1F34-34E5-9085-588C9EFD1CC6} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 | 11.0.61030 | Неизвестно | {CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.50727 False | 11.0.50727 | Неизвестно | {FDB30193-FDA0-3DAA-ACCA-A75EEFE53607} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.51106 False | 11.0.51106 | Неизвестно | {6C772996-BFF3-3C8C-860B-B3D48FF05D65} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 False | 11.0.60610 | Неизвестно | {3D6AD258-61EA-35F5-812C-B7A02152996E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030 | 11.0.61030 | Неизвестно | {B175520C-86A2-35A7-8619-86DC379688B9} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.50727 False | 11.0.50727 | Неизвестно | {2F73A7B2-E50E-39A6-9ABC-EF89E4C62E36} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.51106 False | 11.0.51106 | Неизвестно | {E824E81C-80A4-3DFF-B5F9-4842A9FF5F7F} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 False | 11.0.60610 | Неизвестно | {E7D4E834-93EB-351F-B8FB-82CDAE623003} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030 | 11.0.61030 | Неизвестно | {BD95A8CD-1D9F-35AD-981A-3E7925026EBB} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 False Eng | 12.0.30501.0 | Неизвестно | {050d4fc8-5d48-4b8f-8972-47c82c46020f} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 False | 12.0.30501.0 | Неизвестно | {1a63c099-febd-4eaf-83ad-a82ea4fdac49} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40649 False Eng | 12.0.40649.5 | Неизвестно | {5d0723d3-cff7-4e07-8d0b-ada737deb5e6} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40649 False | 12.0.40649.5 | Неизвестно | {c6870a89-ef30-4f22-bbd1-49cd2516bc56} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40660 False Eng | 12.0.40660.0 | Неизвестно | {ef6b00ec-13e1-4c25-9064-b2f383cb8412} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40660 False | 12.0.40660.0 | Неизвестно | {0513c9cf-7191-45a7-ace9-ecdad03c93a4} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40664 False Eng | 12.0.40664.0 | Неизвестно | {042d26ef-3dbe-4c25-95d3-4c1b11b235a7} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40664 | 12.0.40664.0 | Неизвестно | {49e969a1-2990-464d-92b5-25f6f34573c6} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 False Eng | 12.0.30501.0 | Неизвестно | {f65db027-aff3-4070-886a-0d87064aabb1} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 False | 12.0.30501.0 | Неизвестно | {b55f7208-e02b-4828-ac78-59c73ddf5bc7} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40649 False Eng | 12.0.40649.5 | Неизвестно | {35b83883-40fa-423c-ae73-2aff7e1ea820} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40649 False | 12.0.40649.5 | Неизвестно | {78142960-066b-4581-b984-0bdcf560c4be} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40660 False Eng | 12.0.40660.0 | Неизвестно | {61087a79-ac85-455c-934d-1fa22cc64f36} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40660 False | 12.0.40660.0 | Неизвестно | {10dc8dbf-d3d7-4e23-be07-120fe5c66b78} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40664 False Eng | 12.0.40664.0 | Неизвестно | {9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40664 | 12.0.40664.0 | Неизвестно | {d2c8df0e-f15d-4426-9e51-f13f329f9cb4} | Корпорация Майкрософт |
|
| | Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005 False | 12.0.21005 | Неизвестно | {929FBD26-9020-399B-9A7A-751D61F0B942} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.40649 False | 12.0.40649 | Неизвестно | {20C1086D-C843-36B1-B678-990089D1BD44} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.40660 False | 12.0.40660 | Неизвестно | {5740BD44-B58D-321A-AFC0-6D3D4556DD6C} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.40664 | 12.0.40664 | Неизвестно | {010792BA-551A-3AC0-A7EF-0FAB4156C382} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005 False | 12.0.21005 | Неизвестно | {A749D8E6-B613-3BE3-8F5F-045C84EBA29B} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.40649 False | 12.0.40649 | Неизвестно | {ABB19BB4-838D-3082-BDA4-87C6604181A2} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.40660 False | 12.0.40660 | Неизвестно | {CB0836EC-B072-368D-82B2-D3470BF95707} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.40664 | 12.0.40664 | Неизвестно | {53CF6934-A98D-3D84-9146-FC4EDF3D5641} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 False | 12.0.21005 | Неизвестно | {F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.40649 False | 12.0.40649 | Неизвестно | {A8589745-51BC-3963-B4E9-201CF8693538} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.40660 False | 12.0.40660 | Неизвестно | {7DAD0258-515C-3DD4-8964-BD714199E0F7} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.40664 | 12.0.40664 | Неизвестно | {D401961D-3A20-3AC7-943B-6139D5BD490A} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 False | 12.0.21005 | Неизвестно | {13A4EE12-23EA-3371-91EE-EFB36DDFFF3E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.40649 False | 12.0.40649 | Неизвестно | {DEA7F8E3-B7B9-3C3C-945B-7F8CE9041748} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.40660 False | 12.0.40660 | Неизвестно | {E30D8B21-D82D-3211-82CC-0F0A5D1495E8} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.40664 | 12.0.40664 | Неизвестно | {8122DAB1-ED4D-3676-BB0A-CA368196543E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2017 Redistributable (x64) - 14.13.26020 | 14.13.26020.0 | Неизвестно | {7474cd6e-76cc-4257-837e-5b9261e526af} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2017 Redistributable (x86) - 14.13.26020 | 14.13.26020.0 | Неизвестно | {5c045b7f-e561-4794-91f8-c6cda0893107} | Microsoft Corporation |
|
| | Microsoft Visual C++ 2017 x64 Additional Runtime - 14.13.26020 | 14.13.26020 | Неизвестно | {C5ECDB9A-D9B0-3107-BA85-1269998A5B3E} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2017 x64 Minimum Runtime - 14.13.26020 | 14.13.26020 | Неизвестно | {221D6DB4-46E2-333C-B09B-5F49351D0980} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2017 x86 Additional Runtime - 14.13.26020 | 14.13.26020 | Неизвестно | {895D5198-C5DB-375E-86AB-133F4DAA9FE2} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.13.26020 | 14.13.26020 | Неизвестно | {8F271F6C-6E7B-3D0A-951B-6E7B694D78BD} | Microsoft Corporation | 2018-03-21
|
| | Microsoft Word MUI (English) 2016 | 16.0.4266.1001 | Неизвестно | {90160000-001B-0409-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Microsoft Word MUI (Russian) 2016 [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-001B-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | MSXML 4.0 SP3 Parser (KB2758694) | 4.30.2117.0 | Неизвестно | {1D95BA90-F4F8-47EC-A882-441C99D30C1E} | Microsoft Corporation | 2018-03-21
|
| | NVIDIA GeForce Experience 2.2.2 [russian (russia)] | 2.2.2 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.GFExperience | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA GeForce Experience Service [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_GfExperienceService | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Install Application [russian (russia)] | 2.1002.173.1392 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_installer | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA LED Visualizer 1.0 [russian (russia)] | 1.0 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_GFExperience.LEDVisualizer | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA mental ray and IRay feature plugins for 3ds Max 2018 | 19.0.0.0 | Неизвестно | {C76BBD60-09DB-43B3-B5B0-BF00C80B500C} | Autodesk | 2018-06-13
|
| | NVIDIA Network Service [russian (russia)] | 2.2 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Network.Service | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Optimus Update 17.12.8 [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Optimus | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA PhysX | 9.14.0702 | Неизвестно | {B455E95A-B804-439F-B533-336B1635AE97} | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA ShadowPlay 17.12.8 [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_ShadowPlay | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Update Core [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Update.Core | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Virtual Audio 1.2.27 [russian (russia)] | 1.2.27 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_VirtualAudio.Driver | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Графический драйвер 347.52 [russian (russia)] | 347.52 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver | NVIDIA Corporation | 2018-04-02
|
| | NVIDIA Системное программное обеспечение PhysX 9.14.0702 [russian (russia)] | 9.14.0702 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.PhysX | NVIDIA Corporation | 2018-04-02
|
| | Office Tab | 11.00 | Неизвестно | {DE469D65-1DEB-4058-BF95-C642D733668D}_is1 | Addin Technology Inc. | 2018-04-05
|
| | Opera Stable 57.0.3098.116 | 57.0.3098.116 | Неизвестно | Opera 57.0.3098.116 | Opera Software |
|
| | Outils de verification linguistique 2016 de Microsoft Office - Francais [french (france)] | 16.0.4266.1001 | Неизвестно | {90160000-001F-040C-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Panasonic Easy Print Utility [russian] | 1.00.0000 | Неизвестно | {47D884A9-7354-4034-A663-81544A68B386} | Panasonic System Networks Co., Ltd. | 2018-06-17
|
| | Panasonic V1.15.00RU Статус устройства [russian] | 1.00 | Неизвестно | {5061C9FB-BA2D-4498-92B6-5459A0E2F6E3} | Panasonic System Networks Co., Ltd. | 2018-06-17
|
| | Pandora Service | | Неизвестно | 4F6D5E84-5826-4394-9F40-3A9A19165651_is1 | Pandora.TV | 2018-04-05
|
| | PDF Report Writer (novaPDF 6.4 printer) | | Неизвестно | PDF Report Writer_is1 | Softland | 2018-04-05
|
| | PL-2303 USB-to-Serial [english] | 1.11.2 | Неизвестно | {ECC3713C-08A4-40E3-95F1-7D0704F1CE5E} | Prolific Technology INC | 2018-04-13
|
| | Readiris Pro 7.0 | | Неизвестно | {875F2DAB-3B03-11D5-AB3E-000102B0F79A} | |
|
| | Realtek Card Reader | 6.3.9600.21257 | Неизвестно | {5BC2B5AB-80DE-4E83-B8CF-426902051D0A} | Realtek Semiconductor Corp. | 2018-04-02
|
| | Realtek Ethernet Controller Driver | 1.00.0033 | Неизвестно | {8833FFB6-5B0C-4764-81AA-06DFEED9A476} | Realtek | 2018-04-02
|
| | REALTEK GbE & FE Ethernet PCI-E NIC Driver | 5.836.125.2018 | Неизвестно | {C9BED750-1211-4480-B1A5-718A3BE15525} | Realtek | 2018-04-02
|
| | RocketDock 1.3.5 | | Неизвестно | RocketDock_is1 | Punk Software | 2018-04-04
|
| | Samsung Magician | 5.2.0.1610 | Неизвестно | {29AE3F9F-7158-4ca7-B1ED-28A73ECDB215}_is1 | Samsung Electronics | 2018-04-04
|
| | Security Update for Microsoft Office 2016 (KB2920723) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{370B11B2-F876-4EDE-BD13-E323E9AB215F} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB3085538) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{5A84393A-E440-48A1-BB99-AD1244AC0C35} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB3115135) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{02E071E3-BA0C-48C5-8D1E-6701065D1A3E} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB3213551) 64-Bit Edition | | Неизвестно | {90160000-006E-0419-1000-0000000FF1CE}_Office16.STANDARD_{7AFED019-B612-489B-B369-2920C6B5A96D} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB4011143) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{FE1D0112-B10B-44FC-A1B4-C4FE863CB5E0} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB4011185) 64-Bit Edition | | Неизвестно | {90160000-006E-0419-1000-0000000FF1CE}_Office16.STANDARD_{4EAC16BA-08BE-44DE-AD3D-4FF4C309CCFE} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB4011574) 64-Bit Edition | | Неизвестно | {90160000-006E-0419-1000-0000000FF1CE}_Office16.STANDARD_{FF3C4299-6B38-4207-845A-DD8AEBAE2475} | Microsoft |
|
| | Security Update for Microsoft Office 2016 (KB4011686) 64-Bit Edition | | Неизвестно | {90160000-00C1-0419-1000-0000000FF1CE}_Office16.STANDARD_{3F447433-C9C5-4C10-9821-BBBCDDC134D9} | Microsoft |
|
| | Security Update for Microsoft Outlook 2016 (KB4011682) 64-Bit Edition | | Неизвестно | {90160000-001A-0419-1000-0000000FF1CE}_Office16.STANDARD_{5EF12F20-4645-4374-8F2C-D965115B4054} | Microsoft |
|
| | Sentinel HASP Run-time | 5.10.1.17163 | Неизвестно | {2A414CBE-CDF3-48C6-A91B-D3D4522F8EB5} | SafeNet Inc. | 2018-04-05
|
| | SHIELD Streaming [russian (russia)] | 4.0.1000 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_GFExperience.NvStreamSrv | NVIDIA Corporation | 2018-04-02
|
| | SHIELD Wireless Controller Driver [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_ShieldWirelessController | NVIDIA Corporation | 2018-04-02
|
| | Skype, версия 8.23 | 8.23 | Неизвестно | Skype_is1 | Skype Technologies S.A. | 2018-06-24
|
| | Sony Mobile Software Update Drivers | 3.2.0.3 | Неизвестно | {4872001F-F67C-4C54-BC92-281C6A165251} | Sony Mobile Communications | 2018-07-22
|
| | Sony Mobile Update Engine | 2.18.9.201806291355 | Неизвестно | Update Engine | Sony Mobile Communications Inc. | 2018-07-23-200913
|
| | SPDS Extension for AutoCAD® 2015 [russian (russia)] | 4.0.0 | Неизвестно | {0659A92D-DAEB-4642-8BDE-8C848789203F} | Autodesk, Inc. | 2018-04-05
|
| | Steam | 2.10.91.91 | Неизвестно | Steam | Valve Corporation |
|
| | Synaptics Pointing Device Driver | 18.0.5.0 | Неизвестно | SynTPDeinstKey | Synaptics Incorporated |
|
| | The KMPlayer (remove only) | 3.6.0.87 | Неизвестно | The KMPlayer | KMP Media co., Ltd |
|
| | Update for Microsoft Access 2016 (KB4011221) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{7F7BF234-4A49-4126-82BB-8A880E846185} | Microsoft |
|
| | Update for Microsoft Excel 2016 (KB4011684) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{50C9E272-CDFC-415E-AC04-9F35B50DA959} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2910954) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{89B85BAE-5618-49A4-9C18-153202BDFC73} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2920678) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{D6AE0D54-13A7-4B0D-A862-8AEF7D4796A6} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2920684) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{4D4432EE-ECE1-42CA-8B93-0916170C8252} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2920712) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{A73D1FF5-0819-44C7-9294-FBDD4BA2F43B} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2920720) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{8683D594-A08C-451F-82C3-51D6FB730A6C} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB2920724) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{AA7A282E-E962-4C45-9A74-16C49FD88FF1} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3114389) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{C46085F9-0344-4F42-AE4C-B25B1881BD82} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3114903) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{92281B72-2A8C-40A4-BD15-58CCDF7DEDB1} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3115081) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{78D7B4DE-619F-4312-9707-DF354A48D110} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3115276) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{45610767-EC8C-44CD-9001-6845F626FCD5} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3115281) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{A7364D7B-4090-4536-AB7D-F80AA3A8995A} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3118262) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{7D634991-F4C0-4761-9F90-54F69A8199EB} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3118263) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{94848838-9497-4F39-8294-CFB65614776A} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3118264) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{B2437330-4140-4B97-8041-3D337D716DC9} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3141457) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{53515168-F906-4C7C-8038-9EF0CEBC6EB5} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3141506) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{847C18F4-D7FD-4833-BCB3-7036953BC967} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3178662) 64-Bit Edition | | Неизвестно | {90160000-001F-0C0A-1000-0000000FF1CE}_Office16.STANDARD_{9E3A63D0-B0C8-455B-9E99-37F0B0CDC7FB} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3191929) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{A65F3D82-7DC0-42EE-9374-AA7BA1AA586A} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3203471) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{86B5E1DD-CAD1-455F-A21E-BA4CA4F74706} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB3213650) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{18224882-1EA1-460B-8899-DD7F013C1EC7} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011031) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{7CB794F9-8C52-4DD4-B9A8-17FB5E66BEA9} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011211) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{D1919D5B-6DB0-4E60-BBF6-D80E1BF0ABD8} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011218) 64-Bit Edition | | Неизвестно | {90160000-0016-0419-1000-0000000FF1CE}_Office16.STANDARD_{3AF87AAA-17AE-4BD0-AAC6-86BA5DF1115E} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011225) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{7C02FBD8-2EA8-4FBA-B47B-20696253BC27} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011259) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{328D548A-FC7C-40E0-A87B-9676C059315B} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011562) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{A6E4BACB-4E5F-40DE-904E-C089CDC2CB27} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011569) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{FFCB61E2-D38E-4BE0-8511-95FEE12D0683} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011625) 64-Bit Edition | | Неизвестно | {90160000-00C1-0409-1000-0000000FF1CE}_Office16.STANDARD_{124AD787-A838-4ED4-87BD-5C4EEBF63011} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011630) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{B28924F7-8261-4281-9D1B-7255C301947E} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011631) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{5909ABC9-CBC7-46A6-B5F3-F354A94E5519} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011664) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{BEBEB9F4-A24F-42E6-BA6C-06F212CD3D48} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011668) 64-Bit Edition | | Неизвестно | {90160000-0012-0000-1000-0000000FF1CE}_Office16.STANDARD_{69EFC30E-7A0E-402C-A719-D44237AB6628} | Microsoft |
|
| | Update for Microsoft Office 2016 (KB4011685) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{F321376E-30CB-4AD1-9230-D11F36299583} | Microsoft |
|
| | Update for Microsoft OneDrive for Business (KB3178707) 64-Bit Edition | | Неизвестно | {90160000-00C1-0419-1000-0000000FF1CE}_Office16.STANDARD_{E5C1DB83-9468-4CE0-947F-1CA99C32EAD2} | Microsoft |
|
| | Update for Microsoft OneNote 2016 (KB4011571) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{E3A3D352-CFC2-4744-9294-6AB1058BBB94} | Microsoft |
|
| | Update for Microsoft PowerPoint 2016 (KB4011663) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{15FC266C-EC31-48E2-B89C-8DED4DC3B910} | Microsoft |
|
| | Update for Microsoft Project 2016 (KB4011672) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{508DA96B-C051-4C04-8DB1-93A66B5FA343} | Microsoft |
|
| | Update for Microsoft Publisher 2016 (KB3178696) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{B65ED2DA-5B85-4CD8-8A15-821E8D7E78AB} | Microsoft |
|
| | Update for Microsoft Visio 2016 (KB4011215) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{FEC1961B-2448-4D8A-9C22-A1CE548711DC} | Microsoft |
|
| | Update for Microsoft Word 2016 (KB4011681) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{21ECE583-73E9-4D36-BF25-BBBA12790A35} | Microsoft |
|
| | Update for Skype for Business 2016 (KB4011662) 64-Bit Edition | | Неизвестно | {90160000-00C1-0000-1000-0000000FF1CE}_Office16.STANDARD_{D8CEB754-14AC-425F-A513-CBEE01FA8E78} | Microsoft |
|
| | VBA (2627.01) | 6.03.00.9402 | Неизвестно | {5545EEE1-FA36-4F76-B6BE-5696E7F4E2D6} | Microsoft Corporation | 2018-04-05
|
| | VIA Диспетчер устройств платформы | 1.42 | Неизвестно | InstallShield_{20D4A895-748C-4D88-871C-FDB1695B0169} | VIA Technologies, Inc. | 2018-04-02
|
| | V-Ray for 3dsmax 2018 for x64 | 3.60.03 | Неизвестно | V-Ray for 3dsmax 2018 for x64 | Chaos Software Ltd |
|
| | WinRAR 5.50 (64-разрядная) | 5.50.0 | Неизвестно | WinRAR archiver | win.rar GmbH |
|
| | Засоби перевірки правопису Microsoft Office 2016 – українська [ukrainian (ukraine)] | 16.0.4266.1001 | Неизвестно | {90160000-001F-0422-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | Импорт SketchUp [russian (russia)] | 1.2.0 | Неизвестно | {C403E867-FCF1-432B-BCC1-8FFD40A10A6E} | Autodesk | 2018-04-05
|
| | Картограмма земляных масс [russian (russia)] | 5.2.0 | Неизвестно | {6864F0ED-9541-470B-A0D0-3B5B9AE8DC58} | BearDyugin | 2018-05-07
|
| | МенюГЕО v20.4.4.1 [russian (russia)] | v20.4.4.1 | Неизвестно | МенюГЕО v20.4.4.1 | =Д.Р.В.= | 2018-04-11
|
| | Обновления NVIDIA 17.12.8 [russian (russia)] | 17.12.8 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Update | NVIDIA Corporation | 2018-04-02
|
| | Пакет драйверов Windows - Sony Mobile Communications (ggsomc) SOMCFlashDevice (12/06/2017 3.2.0.0) | 12/06/2017 3.2.0.0 | Неизвестно | 7AA77B236196DB9A6C04257060560ACDBB626F30 | Sony Mobile Communications |
|
| | Пакет локализации Autodesk AutoCAD Civil 3D 2015 - Русский (Russian) [russian (russia)] | 10.4.524.0 | Неизвестно | {5783F2D7-E000-0419-1102-0060B0CE6BBA} | Autodesk | 2018-04-05
|
| | Панель управления NVIDIA 347.52 [russian (russia)] | 347.52 | Неизвестно | {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.ControlPanel | NVIDIA Corporation | 2018-04-02
|
| | Приложение Autodesk для ПК | 7.0.10.89 | Неизвестно | Autodesk Desktop App | Autodesk |
|
| | Программное обеспечение Panasonic Multi-Function Station [russian] | 1.00 | Неизвестно | {53DE4FAD-F853-44F3-AC39-AD2940E5DD53} | Panasonic System Networks Co., Ltd. | 2018-06-17
|
| | Редактор измерений 7.8.4 | | Неизвестно | Редактор измерений_is1 | | 2018-04-05
|
| | Рекомендованные приложения Autodesk [russian (russia)] | 1.2.1 | Неизвестно | {214F3DDB-4FDA-4BA0-8B0F-C06B87628FEC} | Autodesk | 2018-04-05
|
| | Справка по AutoCAD Civil 3D 2015 - Русская [russian (russia)] | 10.4.532.0 | Неизвестно | {5783F2D7-E047-0419-0100-0060B0CE6BBA} | Autodesk | 2018-04-05
|
| | Средства проверки правописания Microsoft Office 2016 — русский [russian (russia)] | 16.0.4266.1001 | Неизвестно | {90160000-001F-0419-1000-0000000FF1CE} | Microsoft Corporation | 2018-04-05
|
| | | | | | | | |
|
| | Имя протокола | Тип события | Категория | Дата создания | Пользователь | Источник | Описание
|
| | Приложение | Ошибка | Нет | 2019-01-21 10:43:47 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-21 12:27:22 | | NvStreamSvc | 2002:
|
| | Приложение | Ошибка | Нет | 2019-01-21 21:50:13 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-22 02:10:29 | система | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 1 user registry handles leaked from \Registry\User\S-1-5-21-2565272621-3265801521-1628056717-1000: Process 868 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000
|
| | Приложение | Ошибка | Нет | 2019-01-22 08:08:08 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-22 08:54:30 | система | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 1 user registry handles leaked from \Registry\User\S-1-5-21-2565272621-3265801521-1628056717-1000: Process 856 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000
|
| | Приложение | Внимание | Нет | 2019-01-22 08:54:32 | | NvStreamSvc | 2002:
|
| | Приложение | Ошибка | Нет | 2019-01-22 16:18:08 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | Нет | 2019-01-22 19:45:58 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | Нет | 2019-01-22 21:01:29 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | Нет | 2019-01-22 23:52:27 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-23 10:24:34 | | NvStreamSvc | 2002:
|
| | Приложение | Ошибка | Нет | 2019-01-23 21:21:22 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | 100 | 2019-01-24 01:19:50 | | Application Error | 1000: Faulting application name: anki.exe, version: 0.0.0.0, time stamp: 0x5b8e995f Faulting module name: ntdll.dll, version: 6.1.7601.23915, time stamp: 0x59b94ee4 Exception code: 0xc0000374 Fault offset: 0x00000000000bf3e2 Faulting process id: 0x1318 Faulting application start time: 0x01d4b36776a0631a Faulting application path: C:\Programs\Anki\anki.exe Faulting module path: C:\Windows\SYSTEM32\ntdll.dll Report Id: ff5a618c-1f5c-11e9-9b6a-b88687622ac6
|
| | Приложение | Ошибка | Нет | 2019-01-25 08:48:13 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | Нет | 2019-01-25 13:36:24 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-26 01:54:00 | система | Microsoft-Windows-User Profiles Service | 1530: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards. DETAIL - 4 user registry handles leaked from \Registry\User\S-1-5-21-2565272621-3265801521-1628056717-1000: Process 848 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000 Process 848 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000\Software\Microsoft\SystemCertificates\Root Process 848 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000\Software\Microsoft\SystemCertificates\SmartCardRoot Process 848 (\Device\HarddiskVolume2\Windows\System32\lsass.exe) has opened key \REGISTRY\USER\S-1-5-21-2565272621-3265801521-1628056717-1000\Software\Microsoft\SystemCertificates\trust
|
| | Приложение | Ошибка | Нет | 2019-01-26 16:05:39 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Внимание | Нет | 2019-01-27 01:08:55 | | NvStreamSvc | 2002:
|
| | Приложение | Ошибка | Нет | 2019-01-27 09:59:24 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Приложение | Ошибка | Нет | 2019-01-27 10:35:08 | | WinMgmt | 10: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 13:42:45 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 13:42:45 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x38e30a Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-20 13:42:45 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x38e30a Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 13:42:45 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x38e30a Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12288 | 2019-01-20 13:57:35 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x444 Name: C:\Windows\System32\svchost.exe Previous Time: 2019-01-20T10:57:35.719604300Z New Time: 2019-01-20T10:57:35.719000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 16:49:36 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 16:49:36 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x57ce79 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-20 16:49:36 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x57ce79 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 16:49:36 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x57ce79 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 20:57:20 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 20:57:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xc9bcef Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-20 20:57:20 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xc9bcef Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 20:57:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xc9bcef Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 21:05:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 21:05:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xe548fc Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x1dc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-20 21:05:35 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xe548fc Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 21:05:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xe548fc Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 23:27:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 23:27:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 23:27:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 23:27:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-20 23:27:10 | | Microsoft-Windows-Security-Auditing | 4904: An attempt was made to register a security event source. Subject : Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x2258 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x1c544f1
|
| | Безопасность | Audit Success | 13568 | 2019-01-20 23:27:10 | | Microsoft-Windows-Security-Auditing | 4905: An attempt was made to unregister a security event source. Subject Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Process: Process ID: 0x2258 Process Name: C:\Windows\System32\VSSVC.exe Event Source: Source Name: VSSAudit Event Source ID: 0x1c544f1
|
| | Безопасность | Audit Success | 12544 | 2019-01-20 23:27:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-20 23:27:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 03:07:43 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 03:07:43 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-21 03:23:09 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x66f61 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-21 03:23:10 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-21 10:42:27 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10aa4
|
| | Безопасность | Audit Success | 12290 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:29 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9fc Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:29 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:29 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x35662 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:42:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:42:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:43:44 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:43:44 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x75f98 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:43:44 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x75f98 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 10:43:51 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x340 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 10:43:51 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-21 12:27:20 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x75f98 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-21 12:27:22 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-21 21:50:02 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x109c3
|
| | Безопасность | Audit Success | 12290 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9dc Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x36bfc Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:10 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x71ce4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x71ce4 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 21:50:16 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x354 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 21:50:16 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 23:02:00 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-21 23:02:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6bc89f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-21 23:02:00 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6bc89f Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-21 23:02:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6bc89f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-22 02:10:29 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x71ce4 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-22 02:10:31 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-22 08:07:58 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x109ea
|
| | Безопасность | Audit Success | 12290 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:07:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9f8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x3836e Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x500 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76d8d Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x500 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76d8d Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:08:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:08:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:44:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:44:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 08:44:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 08:44:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-22 08:54:30 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76d8d This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-22 08:54:32 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-22 16:17:54 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10a93
|
| | Безопасность | Audit Success | 12290 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9f4 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x374d2 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:17:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:17:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:18:05 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:18:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x72d70 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:18:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x72d70 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 16:18:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 16:18:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 17:42:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 17:42:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-22 17:42:24 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x72d70 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-22 17:42:30 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-22 19:44:58 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10a06
|
| | Безопасность | Audit Success | 12290 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:44:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:45:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:45:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9e8 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x3620d Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:45:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:45:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:54 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:45:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76e1c Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:45:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76e1c Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 19:46:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 19:46:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:00:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:00:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-22 21:00:32 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76e1c This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-22 21:00:34 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12290 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-22 21:01:17 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10ba7
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9f0 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x364e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:26 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x508 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x759c0 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x508 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x759c0 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:01:32 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:01:32 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:13:38 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:13:38 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:32:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 21:32:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:32:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 21:32:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 22:13:47 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x508 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 22:13:47 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x4aca64 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x508 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-22 22:13:47 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x4aca64 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 22:13:47 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x4aca64 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 22:24:54 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x358 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 22:24:54 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12288 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-22 23:52:13 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10e00
|
| | Безопасность | Audit Success | 12290 | 2019-01-22 23:52:15 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:15 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:15 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 23:52:16 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-22 23:52:16 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xa1c Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x3890f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:22 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6f1d2 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6f1d2 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:30 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:30 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-22 23:52:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x38c Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-22 23:52:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 10:03:19 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 10:03:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xb382f1 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x298 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-23 10:03:19 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xb382f1 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 10:03:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0xb382f1 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-23 10:24:32 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6f1d2 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-23 10:24:34 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-23 21:21:08 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-23 21:21:08 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10aa1
|
| | Безопасность | Audit Success | 12290 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9fc Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x357d4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:11 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:11 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:19 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4c8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x725e6 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4c8 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x725e6 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-23 21:21:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-23 21:21:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-24 01:19:50 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-24 01:19:50 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-24 01:57:39 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x725e6 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-24 01:57:44 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-25 08:48:03 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:03 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:03 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-25 08:48:03 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10acf
|
| | Безопасность | Audit Success | 12290 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:05 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:05 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9ec Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x37d1a Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:10 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4fc Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x73196 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4fc Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x73196 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 08:48:17 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 08:48:17 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-25 09:00:25 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x73196 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-25 09:00:27 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-25 13:36:06 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:06 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:06 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-25 13:36:06 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10aa5
|
| | Безопасность | Audit Success | 12290 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:07 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12292 | 2019-01-25 13:36:08 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-25 13:36:08 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:08 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:08 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:09 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:09 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xa10 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x3d937 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:13 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:13 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:21 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3f0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6d51f Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3f0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6d51f Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 13:36:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 13:36:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 16:59:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 16:59:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 17:06:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 17:06:04 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 17:06:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 17:06:04 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 19:20:12 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x3f0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 19:20:12 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x10409d5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x3f0 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-25 19:20:12 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x10409d5 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 19:20:12 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x10409d5 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-25 19:33:01 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x348 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-25 19:33:01 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12545 | 2019-01-26 01:54:00 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x6d51f This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-26 01:54:02 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-26 16:05:25 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:25 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:25 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-26 16:05:25 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10ab8
|
| | Безопасность | Audit Success | 12290 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:26 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xa08 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x375bd Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:28 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:28 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:35 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:35 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76892 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:35 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76892 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 16:05:42 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 16:05:42 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 18:26:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 18:26:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 18:26:34 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 18:26:34 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x24dfe6 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-26 18:26:34 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x24dfe6 Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 18:26:34 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x24dfe6 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 21:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-26 21:42:18 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x344 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 21:42:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-26 21:42:18 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 00:12:19 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 00:12:19 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 7 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x1aaeb4d Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4f4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12545 | 2019-01-27 00:12:19 | | Microsoft-Windows-Security-Auditing | 4634: An account was logged off. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x1aaeb4d Logon Type: 7 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 00:12:19 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x1aaeb4d Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 01:00:20 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x9c Name: C:\Windows\System32\svchost.exe Previous Time: 2019-01-26T22:00:16.803201500Z New Time: 2019-01-26T22:00:20.207046400Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 01:00:20 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x9c Name: C:\Windows\System32\svchost.exe Previous Time: 2019-01-26T22:00:20.209046400Z New Time: 2019-01-26T22:00:20.209000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 01:00:20 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x9c Name: C:\Windows\System32\svchost.exe Previous Time: 2019-01-26T22:00:20.245002000Z New Time: 2019-01-26T22:00:20.245000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Безопасность | Audit Success | 12545 | 2019-01-27 01:08:50 | | Microsoft-Windows-Security-Auditing | 4647: User initiated logoff: Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x76892 This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.
|
| | Безопасность | Audit Success | 103 | 2019-01-27 01:08:56 | | Microsoft-Windows-Eventlog | 1100: The event logging service has shut down.
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 09:58:21 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:21 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:21 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-27 09:58:21 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10945
|
| | Безопасность | Audit Success | 12290 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12292 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:22 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:23 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:23 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9a4 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x364a2 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:58:24 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:58:24 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:59:20 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x4d4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:59:20 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x80716 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4d4 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:59:20 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x80716 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 09:59:27 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 09:59:27 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 10:02:38 | | Microsoft-Windows-Security-Auditing | 4616: The system time was changed. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Process Information: Process ID: 0x1c8 Name: C:\Windows\System32\svchost.exe Previous Time: 2019-01-27T07:02:38.926004200Z New Time: 2019-01-27T07:02:38.926000000Z This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.
|
| | Безопасность | Audit Success | 12288 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4608: Windows is starting up. This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 0 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x4 Process Name: Network Information: Workstation Name: - Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: - Authentication Package: - Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-20 Account Name: NETWORK SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e4 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 13568 | 2019-01-27 10:34:55 | | Microsoft-Windows-Security-Auditing | 4902: The Per-user audit policy table was created. Number of Elements: 0 Policy ID: 0x10b24
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:56 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12290 | 2019-01-27 10:34:57 | | Microsoft-Windows-Security-Auditing | 5056: A cryptographic self test was performed. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Module: ncrypt.dll Return Code: 0x0
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:57 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:57 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12292 | 2019-01-27 10:34:58 | | Microsoft-Windows-Security-Auditing | 5033: The Windows Firewall Driver started successfully.
|
| | Безопасность | Audit Success | 12292 | 2019-01-27 10:34:58 | | Microsoft-Windows-Security-Auditing | 5024: The Windows Firewall service started successfully.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:34:59 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:34:59 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x9ec Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-7 Account Name: АНОНИМНЫЙ ВХОД Account Domain: NT AUTHORITY Logon ID: 0x396b7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V1 Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:00 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:35:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-17 Account Name: IUSR Account Domain: NT AUTHORITY Logon ID: 0x3e3 Privileges: SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:35:00 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:02 | | Microsoft-Windows-Security-Auditing | 4648: A logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: 127.0.0.1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:02 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x5ef56 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x434 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: ТОТ_ЧУВАК-ПК Source Network Address: 127.0.0.1 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:35:02 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-21-2565272621-3265801521-1628056717-1000 Account Name: Тот чувак Account Domain: Тот_чувак-ПК Logon ID: 0x5ef56 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Безопасность | Audit Success | 12544 | 2019-01-27 10:35:10 | | Microsoft-Windows-Security-Auditing | 4624: An account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: ТОТ_ЧУВАК-ПК$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Type: 5 New Logon: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x320 Process Name: C:\Windows\System32\services.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
|
| | Безопасность | Audit Success | 12548 | 2019-01-27 10:35:10 | | Microsoft-Windows-Security-Auditing | 4672: Special privileges assigned to new logon. Subject: Security ID: S-1-5-18 Account Name: система Account Domain: NT AUTHORITY Logon ID: 0x3e7 Privileges: SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege
|
| | Система | Внимание | Нет | 2019-01-20 13:42:35 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on ''. NtpClient will try again in 3473457 minutes and double the reattempt interval thereafter. The error was: Запрошенное имя верно, но данные запрошенного типа не найдены. (0x80072AFC)
|
| | Система | Внимание | Нет | 2019-01-20 13:42:44 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-20 16:49:34 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-20 16:55:22 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name retracker.local timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-20 20:57:19 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Ошибка | Нет | 2019-01-20 20:58:14 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-20 20:58:14 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Внимание | Нет | 2019-01-20 20:58:17 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-20 21:05:36 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name wpad.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-21 03:23:11 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-21 10:42:22 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-21 10:42:28 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-21 10:42:30 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-21 10:42:37 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-21 12:27:21 | LOCAL SERVICE | Microsoft-Windows-Time-Service | 134: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on ''. NtpClient will try again in 3473457 minutes and double the reattempt interval thereafter. The error was: Запрошенное имя верно, но данные запрошенного типа не найдены. (0x80072AFC)
|
| | Система | Внимание | Нет | 2019-01-21 12:27:22 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-21 21:49:57 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-21 21:50:03 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-21 21:50:05 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-21 21:50:12 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:14 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:14 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:17 | система | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:17 | система | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:17 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:17 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:21 | система | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:21 | система | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:21 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:21 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:25 | система | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:25 | система | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-21 21:51:27 | система | Schannel | 36887: The following fatal alert was received: 20.
|
| | Система | Внимание | Нет | 2019-01-22 01:29:09 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name dns.msftncsi.com timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-22 01:38:56 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name imgcdn.ptvcdn.net timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-22 02:10:31 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-22 08:07:53 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 08:07:59 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 08:08:01 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-22 08:08:08 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:15 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:15 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:16 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:16 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:19 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:19 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:20 | Тот чувак | Schannel | 36888: The following fatal alert was generated: 43. The internal error state is 552.
|
| | Система | Ошибка | Нет | 2019-01-22 08:16:20 | Тот чувак | Schannel | 36884: The certificate received from the remote server does not contain the expected name. It is therefore not possible to determine whether we are connecting to the correct server. The server name we were expecting is autoupdate.geo.opera.com. The SSL connection request has failed. The attached data contains the server certificate.
|
| | Система | Внимание | 212 | 2019-01-22 08:47:15 | система | Microsoft-Windows-Kernel-PnP | 219:
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:16 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:17 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:17 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:18 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:18 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:18 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:19 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:19 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Ошибка | Нет | 2019-01-22 08:47:20 | | Disk | 11: The driver detected a controller error on \Device\Harddisk1\DR1.
|
| | Система | Внимание | Нет | 2019-01-22 08:54:32 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-22 16:17:49 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 16:17:55 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 16:17:57 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-22 16:18:04 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-22 17:42:30 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-22 19:44:53 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 19:44:59 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 19:45:01 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-22 19:45:08 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | 212 | 2019-01-22 20:56:34 | система | Microsoft-Windows-Kernel-PnP | 219:
|
| | Система | Внимание | Нет | 2019-01-22 21:00:34 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-22 21:01:11 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 21:01:18 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 21:01:20 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | 212 | 2019-01-22 21:01:20 | система | Microsoft-Windows-Kernel-PnP | 219:
|
| | Система | Внимание | Нет | 2019-01-22 21:01:27 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-22 21:02:18 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | 223 | 2019-01-22 21:02:54 | система | Microsoft-Windows-Kernel-PnP | 225: Operation did not complete successfully because the file contains a virus.
|
| | Система | Внимание | Нет | 2019-01-22 22:11:26 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | 223 | 2019-01-22 22:14:24 | система | Microsoft-Windows-Kernel-PnP | 225: Operation did not complete successfully because the file contains a virus.
|
| | Система | Внимание | 223 | 2019-01-22 22:35:44 | система | Microsoft-Windows-Kernel-PnP | 225: Operation did not complete successfully because the file contains a virus.
|
| | Система | Ошибка | Нет | 2019-01-22 23:52:07 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 23:52:13 | | EventLog | 6008: The previous system shutdown at 23:29:11 on ?22.?01.?2019 was unexpected.
|
| | Система | Ошибка | Нет | 2019-01-22 23:52:16 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-22 23:52:17 | | BugCheck | 1001: The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001e (0xffffffffc0000005, 0xfffff880035a96ba, 0x0000000000000001, 0x0000192c00000008). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 012219-12074-01.
|
| | Система | Ошибка | Нет | 2019-01-22 23:52:19 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | 212 | 2019-01-22 23:52:19 | система | Microsoft-Windows-Kernel-PnP | 219:
|
| | Система | Внимание | Нет | 2019-01-22 23:52:23 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-22 23:53:11 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-23 02:05:33 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name www.liberty.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-23 10:03:21 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-23 10:24:34 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-23 21:21:03 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-23 21:21:09 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-23 21:21:11 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-23 21:21:18 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | 223 | 2019-01-23 21:34:20 | система | Microsoft-Windows-Kernel-PnP | 225: Operation did not complete successfully because the file contains a virus.
|
| | Система | Внимание | 223 | 2019-01-23 23:06:38 | система | Microsoft-Windows-Kernel-PnP | 225: Operation did not complete successfully because the file contains a virus.
|
| | Система | Внимание | Нет | 2019-01-24 01:57:43 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-25 08:47:58 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-25 08:48:04 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-25 08:48:06 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-25 08:48:13 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | 212 | 2019-01-25 08:49:24 | система | Microsoft-Windows-Kernel-PnP | 219:
|
| | Система | Внимание | Нет | 2019-01-25 09:00:27 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-25 13:36:00 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-25 13:36:08 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-25 13:36:13 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-25 13:36:16 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-25 13:37:15 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name api3.fri-gate.eu timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-25 19:20:08 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-26 00:44:06 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name delivery.h.switchadhub.com timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-26 01:54:02 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-26 16:05:20 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-26 16:05:26 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-26 16:05:28 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-26 16:05:35 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Внимание | Нет | 2019-01-26 16:06:17 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name _ldap._tcp.dc._msdcs.wifi.beeline.ru timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-26 21:12:52 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name dnl-02.geo.kaspersky.com timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-26 22:34:35 | | Tcpip | 4205: Autoconfigured route limit has been reached. No further autoconfigured routes will be added until the interface is reconnected.
|
| | Система | Ошибка | Нет | 2019-01-26 23:36:39 | | volsnap | 36: The shadow copies of volume C: were aborted because the shadow copy storage could not grow due to a user imposed limit.
|
| | Система | Внимание | Нет | 2019-01-27 00:12:12 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name isatap.Dlink timed out after none of the configured DNS servers responded.
|
| | Система | Внимание | Нет | 2019-01-27 01:08:56 | система | Microsoft-Windows-WLAN-AutoConfig | 4001: WLAN AutoConfig service has successfully stopped.
|
| | Система | Ошибка | Нет | 2019-01-27 09:58:16 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-27 09:58:22 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-27 09:58:24 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-27 09:58:31 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Ошибка | Нет | 2019-01-27 09:59:24 | система | Schannel | 36887: The following fatal alert was received: 70.
|
| | Система | Ошибка | Нет | 2019-01-27 09:59:24 | система | Schannel | 36887: The following fatal alert was received: 40.
|
| | Система | Внимание | Нет | 2019-01-27 10:01:01 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name ocsp.comodoca.com timed out after none of the configured DNS servers responded.
|
| | Система | Ошибка | Нет | 2019-01-27 10:34:50 | | Application Popup | 1060: \??\C:\Windows\SysWow64\DRIVERS\NVKEYNT.SYS has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-27 10:34:56 | | EventLog | 6008: The previous system shutdown at 10:33:16 on ?27.?01.?2019 was unexpected.
|
| | Система | Ошибка | Нет | 2019-01-27 10:34:58 | | Application Popup | 1060: \??\C:\Windows\SysWow64\drivers\printsrv.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.
|
| | Система | Ошибка | Нет | 2019-01-27 10:34:58 | | BugCheck | 1001: The computer has rebooted from a bugcheck. The bugcheck was: 0x0bad0020 (0x0000000000000008, 0xfffff8801fdc0990, 0xfffff8801fdc0378, 0xfffff8801fdbfbe0). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 012719-10654-01.
|
| | Система | Ошибка | Нет | 2019-01-27 10:35:00 | | Service Control Manager | 7026: The following boot-start or system-start driver(s) failed to load: NVKEYNT
|
| | Система | Внимание | Нет | 2019-01-27 10:35:05 | система | Microsoft-Windows-Wininit | 11: Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
|
| | Система | Ошибка | Нет | 2019-01-27 10:35:09 | система | Schannel | 36887: The following fatal alert was received: 70.
|
| | Система | Ошибка | Нет | 2019-01-27 10:35:09 | система | Schannel | 36887: The following fatal alert was received: 40.
|
| | Система | Внимание | Нет | 2019-01-27 10:37:52 | NETWORK SERVICE | Microsoft-Windows-DNS-Client | 1014: Name resolution for the name vk.com timed out after none of the configured DNS servers responded.
|