Application Events - J-Net Community

advertisement
Application Events
Level,Date and Time,Source,Event ID,Task Category
Error,25/07/2011 4:59:10 PM,SideBySide,35,None,"Activation context generation
failed for ""C:\Program Files (x86)\Sony\Media Go\MediaGo.exe"".Error in
manifest or policy file ""C:\Program Files (x86)\Sony\Media
Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found in manifest does
not match the identity of the component requested. Reference is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:59:08 PM,Microsoft-WindowsRestartManager,10001,None,Ending session 0 started 2011-0725T20:58:50.568625900Z.
Information,25/07/2011 4:59:08 PM,MsiInstaller,1042,None,Ending a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\Netshim.msi. Client Process Id: 7764.
Information,25/07/2011 4:59:08 PM,MsiInstaller,1033,None,Windows Installer
installed the product. Product Name: Junos Pulse Netshim/Tunnel Manager/IPSec
Manager Add-On. Product Version: 2.0.10059. Product Language: 1033.
Manufacturer: Juniper Networks. Installation success or error status: 1603.
Information,25/07/2011 4:59:08 PM,MsiInstaller,11708,None,Product: Junos
Pulse Netshim/Tunnel Manager/IPSec Manager Add-On -- Installation failed.
Information,25/07/2011 4:58:50 PM,Microsoft-WindowsRestartManager,10000,None,Starting session 0 - 2011-0725T20:58:50.568625900Z.
Information,25/07/2011 4:58:50 PM,Microsoft-WindowsRestartManager,10001,None,Ending session 0 started 2011-0725T20:58:15.633627700Z.
Information,25/07/2011 4:58:50 PM,MsiInstaller,1040,None,Beginning a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\Netshim.msi. Client Process Id: 7764.
Information,25/07/2011 4:58:50 PM,MsiInstaller,1042,None,Ending a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\JunosPulseCore.msi. Client Process Id: 6404.
Information,25/07/2011 4:58:50 PM,MsiInstaller,1033,None,Windows Installer
installed the product. Product Name: Junos Pulse Core Components. Product
Version: 2.0.10059. Product Language: 1033. Manufacturer: Juniper Networks.
Installation success or error status: 0.
Information,25/07/2011 4:58:50 PM,MsiInstaller,11707,None,Product: Junos
Pulse Core Components -- Installation completed successfully.
Information,25/07/2011 4:58:15 PM,Microsoft-WindowsRestartManager,10000,None,Starting session 0 - 2011-0725T20:58:15.633627700Z.
Information,25/07/2011 4:58:15 PM,Microsoft-WindowsRestartManager,10001,None,Ending session 0 started 2011-0725T20:58:13.173487000Z.
Information,25/07/2011 4:58:15 PM,MsiInstaller,1040,None,Beginning a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\JunosPulseCore.msi. Client Process Id: 6404.
Information,25/07/2011 4:58:15 PM,MsiInstaller,1042,None,Ending a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\VC8Runtime.msi. Client Process Id: 1716.
Information,25/07/2011 4:58:15 PM,MsiInstaller,1033,None,Windows Installer
installed the product. Product Name: VC8 CRT. Product Version: 8.0.50727.762.
Product Language: 1033. Manufacturer: Juniper Networks. Installation success
or error status: 0.
Information,25/07/2011 4:58:15 PM,MsiInstaller,11707,None,Product: VC8 CRT -Installation completed successfully.
Information,25/07/2011 4:58:13 PM,Microsoft-WindowsRestartManager,10000,None,Starting session 0 - 2011-0725T20:58:13.173487000Z.
Information,25/07/2011 4:58:12 PM,MsiInstaller,1040,None,Beginning a Windows
Installer transaction: C:\Users\Horia\AppData\Roaming\Juniper Networks\Setup
Client\VC8Runtime.msi. Client Process Id: 1716.
Information,25/07/2011 4:52:13 PM,Microsoft-Windows-SecuritySPP,903,None,"The Software Protection service has stopped.
"
Information,25/07/2011 4:51:54 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:51:45 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Warning,25/07/2011 4:51:41 PM,Microsoft-Windows-Search,3036,Gatherer,"The
content source <mapi://{S-1-5-21-3249341697-3537190303-2455221922-1001}/>
cannot be accessed.
Context:
Application, SystemIndex Catalog
Details:
A server error occurred. Check that the server is available. (HRESULT
: 0x80041206) (0x80041206)
"
Information,25/07/2011 4:50:51 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 4:50:42 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 4:50:11 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:50:06 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Warning,25/07/2011 4:49:40 PM,Microsoft-Windows-Search,3036,Gatherer,"The
content source <mapi://{S-1-5-21-3249341697-3537190303-2455221922-1001}/>
cannot be accessed.
Context:
Application, SystemIndex Catalog
Details:
A server error occurred. Check that the server is available. (HRESULT
: 0x80041206) (0x80041206)
"
Information,25/07/2011 4:49:17 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,25/07/2011 4:49:11 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:49:11 PM,gusvc,0,None,"The description for Event ID
0 from source gusvc cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:49:08 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 4:49:02 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 4:49:01 PM,Microsoft-WindowsCAPI2,4097,None,"Successful auto update of third-party root certificate::
Subject: <CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com,
O=DigiCert Inc, C=US> Sha1 thumbprint:
<5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25>."
Information,25/07/2011 4:47:43 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,25/07/2011 4:47:13 PM,Microsoft-Windows-SecuritySPP,902,None,"The Software Protection service has started.
6.1.7600.16385"
Information,25/07/2011 4:47:13 PM,Microsoft-Windows-SecuritySPP,1003,None,"The Software Protection service has completed licensing status
check.
Application Id=55c92734-d682-4d71-983e-d6ec3f16059f
Licensing Status=
1: 022a1afb-b893-4190-92c3-8f69a49839fb, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
2: 7cfd4696-69a9-4af7-af36-ff3d12b6b6c8, 1, 1 [(0 [0x00000000, 1, 0],
[(?)(?)( 1 0x00000000 0 0 msft:rm/algorithm/bios/4.0 0x00000000
0)(?)(?)(?)])(1 )(2 )]
3: a0cde89c-3304-4157-b61c-c8ad785d1fad, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
4: ac96e1a8-6cc4-4310-a4ff-332ce77fb5b8, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
5: cfb3e52c-d707-4861-af51-11b27ee6169c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
6: 4a8149bb-7d61-49f4-8822-82c7bf88d64b, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
7: afd5f68f-b70f-4000-a21d-28dbc8be8b07, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
"
Information,25/07/2011 4:47:13 PM,Microsoft-Windows-SecuritySPP,1066,None,"Initialization status for service objects.
C:\Windows\system32\sppwinob.dll, msft:spp/windowsfunctionality/agent/7.0,
0x00000000, 0x00000000
C:\Windows\system32\sppobjs.dll, msft:rm/algorithm/phone/1.0, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:rm/algorithm/pkey/2005, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:spp/TaskScheduler/1.0, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:spp/volume/services/kms/1.0,
0x00000000, 0x00000000
C:\Windows\system32\sppobjs.dll,
msft:spp/volume/services/kms/licenserenewal/1.0, 0x00000000, 0x00000000
"
Information,25/07/2011 4:47:11 PM,SecurityCenter,1,None,The Windows Security
Center Service has started.
Information,25/07/2011 4:47:11 PM,sprtsvc_dellsupportcenter,1,None,"The
description for Event ID 1 from source sprtsvc_dellsupportcenter cannot be
found. Either the component that raises this event is not installed on your
local computer or the installation is corrupted. You can install or repair
the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:47:10 PM,Microsoft-Windows-SecuritySPP,900,None,"The Software Protection service is starting.
"
Information,25/07/2011 4:47:07 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:46:07 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:45:59 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:45:51 PM,Microsoft-Windows-Search,1003,Search
service,The Windows Search Service started.
Information,25/07/2011 4:45:38 PM,ESENT,302,Logging/Recovery,Windows (6056)
Windows: The database engine has successfully completed recovery steps.
Information,25/07/2011 4:45:36 PM,ESENT,301,Logging/Recovery,Windows (6056)
Windows: The database engine has begun replaying logfile
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log.
Error,25/07/2011 4:45:36 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:45:35 PM,Windows Error Reporting,1001,None,"Fault
bucket 8741692, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: EvtEng.exe
P2: 13.0.0.0
P3: 4ab80b1f
P4: EvtEng.exe
P5: 13.0.0.0
P6: 4ab80b1f
P7: 40000015
P8: 00000000000c06ae
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERAEB5.tmp.appcompat.txt
C:\WINDOWS\Temp\WERB5F6.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERB607.tmp.hdmp
C:\WINDOWS\Temp\WERBAB9.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_EvtEng.exe_d24eff
3b33562b4f23974f82f7744f564ea28bf5_14992d08
Analysis symbol:
Rechecking for solution: 0
Report Id: f7c4f21d-b6fe-11e0-903b-005056c00008
Report Status: 0"
Information,25/07/2011 4:45:35 PM,Windows Error Reporting,1001,None,"Fault
bucket 7968693, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERBA0B.tmp.appcompat.txt
C:\WINDOWS\Temp\WERBA3A.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERBA6A.tmp.hdmp
C:\WINDOWS\Temp\WERBC20.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WLANExt.exe_52ef4
7a1dc572c89e0206ac510ed1ee393dc736_14dd2d08
Analysis symbol:
Rechecking for solution: 0
Report Id: f97f2bb7-b6fe-11e0-903b-005056c00008
Report Status: 0"
Information,25/07/2011 4:45:26 PM,ESENT,301,Logging/Recovery,Windows (6056)
Windows: The database engine has begun replaying logfile
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS001DB.log.
Information,25/07/2011 4:45:25 PM,ESENT,300,Logging/Recovery,Windows (6056)
Windows: The database engine is initiating recovery steps.
Information,25/07/2011 4:45:25 PM,ESENT,102,General,Windows (6056) Windows:
The database engine (6.01.7600.0000) started a new instance (0).
Error,25/07/2011 4:45:17 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:17 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:11 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:11 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:10 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:07 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:45:06 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:45:06 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERBA0B.tmp.appcompat.txt
C:\WINDOWS\Temp\WERBA3A.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERBA6A.tmp.hdmp
C:\WINDOWS\Temp\WERBC20.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WLANExt.exe_52ef47a
1dc572c89e0206ac510ed1ee393dc736_cab_0dccbce8
Analysis symbol:
Rechecking for solution: 0
Report Id: f97f2bb7-b6fe-11e0-903b-005056c00008
Report Status: 4"
Error,25/07/2011 4:45:06 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:45:06 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: EvtEng.exe
P2: 13.0.0.0
P3: 4ab80b1f
P4: EvtEng.exe
P5: 13.0.0.0
P6: 4ab80b1f
P7: 40000015
P8: 00000000000c06ae
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERAEB5.tmp.appcompat.txt
C:\WINDOWS\Temp\WERB5F6.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERB607.tmp.hdmp
C:\WINDOWS\Temp\WERBAB9.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_EvtEng.exe_d24eff3b
33562b4f23974f82f7744f564ea28bf5_cab_1164bbbf
Analysis symbol:
Rechecking for solution: 0
Report Id: f7c4f21d-b6fe-11e0-903b-005056c00008
Report Status: 4"
Error,25/07/2011 4:45:05 PM,Application Error,1000,(100),"Faulting
application name: WLANExt.exe, version: 6.1.7600.16385, time stamp:
0x4a5bcc33
Faulting module name: msvcrt.dll, version: 7.0.7600.16385, time stamp:
0x4a5bdfbe
Exception code: 0x40000015
Fault offset: 0x000000000002aa8e
Faulting process id: 0x730
Faulting application start time: 0x01cc4b0badd5642f
Faulting application path: C:\Windows\system32\WLANExt.exe
Faulting module path: C:\Windows\system32\msvcrt.dll
Report Id: f97f2bb7-b6fe-11e0-903b-005056c00008"
Information,25/07/2011 4:45:05 PM,HPSLPSVC,0,None,"The description for Event
ID 0 from source HPSLPSVC cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:45:05 PM,hpqcxs08,0,None,"The description for Event
ID 0 from source hpqcxs08 cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:45:05 PM,Pure Networks Platform
Service,1,None,"Service successfully started.
"
Error,25/07/2011 4:45:02 PM,Application Error,1000,(100),"Faulting
application name: EvtEng.exe, version: 13.0.0.0, time stamp: 0x4ab80b1f
Faulting module name: EvtEng.exe, version: 13.0.0.0, time stamp: 0x4ab80b1f
Exception code: 0x40000015
Fault offset: 0x00000000000c06ae
Faulting process id: 0x804
Faulting application start time: 0x01cc4b0bb000cfe2
Faulting application path: C:\Program Files\Intel\WiFi\bin\EvtEng.exe
Faulting module path: C:\Program Files\Intel\WiFi\bin\EvtEng.exe
Report Id: f7c4f21d-b6fe-11e0-903b-005056c00008"
Information,25/07/2011 4:45:02 PM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0725164456157_p_00000_00.x picid=0725164456298_g_00000_23.x
Information,25/07/2011 4:45:00 PM,McLogEvent,5000,None,"McShield service
started.
Engine version : 5400.1158
DAT version : 6417.0000
Number of signatures in EXTRA.DAT : None
Names of threats that EXTRA.DAT can detect : None"
Information,25/07/2011 4:44:56 PM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Information,25/07/2011 4:44:56 PM,Microsoft-Windows-Winlogon,6000,None,The
winlogon notification subscriber <SessionEnv> was unavailable to handle a
notification event.
Information,25/07/2011 4:44:56 PM,Microsoft-WindowsWinlogon,4101,None,Windows license validated.
Information,25/07/2011 4:44:54 PM,IAANTmon,7500,None,Intel RAID Controller:
Unknown Controller
Number of Serial ATA ports: 3
RAID Option ROM Version: Unknown
Driver Version: 8.9.0.1023
RAID Plug-In Version: 8.9.0.1023
Language Resource Version of the RAID Plug-In: File not found
Create Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Create Volume Wizard: File not found
Create Volume from Existing Hard Drive Wizard Version: 8.9.0.1023
Language Resource Version of the Create Volume from Existing Hard Drive
Wizard: File not found
Modify Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Modify Volume Wizard: File not found
Delete Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Delete Volume Wizard: File not found
ISDI Library Version: 8.9.0.1023
Event Monitor User Notification Tool Version: 8.9.0.1023
Language Resource Version of the Event Monitor User Notification Tool: File
not found
Event Monitor Version: 8.9.0.1023
Hard Drive 0
Usage: Unknown hard drive usage
Status: Normal
Device Port: 0
Device Port Location: Internal
Current Serial ATA Transfer Mode: Generation 2
Model: WDC WD6400BEVT-75A0RT0
Serial Number: WD-WX21A3060432
Firmware: 01.01A01
Native Command Queuing Support: Yes
System Hard Drive: Yes
Size: 596.1 GB
Physical Sector Size: 512 Bytes
Logical Sector Size: 512 Bytes
Unused Port 0
Device Port: 5
Device Port Location: External
CD/DVD Drive 0
Device Port: 1
Device Port Location: Internal
Current Serial ATA Transfer Mode: Generation 1
Model: HL-DT-ST DVDRW/BDROM CA10N
Serial Number: K0ZA46D4626
Firmware: A110
Information,25/07/2011 4:44:54 PM,Microsoft-Windows-WMI,5617,None,Windows
Management Instrumentation Service subsystems initialized successfully
Information,25/07/2011 4:44:50 PM,YahooAUService,0,None,"The description for
Event ID 0 from source YahooAUService cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:44:49 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
WLIDInitializationTimerQueue. QueueWorkItem started (44:49:942)
"
Information,25/07/2011 4:44:49 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
g_ WLIDInitializationTimerQueue.Initialize started (44:49:941)
"
Information,25/07/2011 4:44:49 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
g_WLIDTimerQueue.Initialize started (44:49:940)
"
Information,25/07/2011 4:44:49 PM,VMware NAT Service,1000,None,Using
configuration file: C:\ProgramData\VMware\vmnetnat.conf.
IP address: 192.168.140.2
Subnet: 255.255.255.0
External IP address: 0.0.0.0
Device: VMnet8.
MAC address: 00:50:56:FC:0F:25.
Ignoring host MAC address: 00:50:56:C0:00:08.
Information,25/07/2011 4:44:49 PM,Microsoft-Windows-WMI,5615,None,Windows
Management Instrumentation Service started sucessfully
Information,25/07/2011 4:44:49 PM,VMware NAT Service,1000,None,Service
started
Information,25/07/2011 4:44:48 PM,SeaPort,0,None,Service started
Information,25/07/2011 4:44:48 PM,RegSrvc,0,None,"The description for Event
ID 0 from source RegSrvc cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,25/07/2011 4:44:48 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:44:47 PM,hpqddsvc,0,None,"The description for Event
ID 0 from source hpqddsvc cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:44:45 PM,EvtEng,0,None,"The description for Event ID
0 from source EvtEng cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:44:45 PM,btwdins,0,None,"The description for Event
ID 0 from source btwdins cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:44:45 PM,AdobeARMservice,0,None,"The description for
Event ID 0 from source AdobeARMservice cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:44:41 PM,Microsoft-Windows-User Profiles
Service,1531,None,"The User Profile Service has started successfully.
"
Information,25/07/2011 4:44:41 PM,Microsoft-Windows-EventSystem,4625,None,The
EventSystem sub system is suppressing duplicate event log entries for a
duration of 86400 seconds. The suppression timeout can be controlled by a
REG_DWORD value named SuppressDuplicateDuration under the following registry
key: HKLM\Software\Microsoft\EventSystem\EventLog.
Error,25/07/2011 4:44:40 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:43:49 PM,Microsoft-Windows-Winlogon,6000,None,The
winlogon notification subscriber <SessionEnv> was unavailable to handle a
notification event.
Information,25/07/2011 4:43:49 PM,Desktop Window Manager,9009,None,The
Desktop Window Manager has exited with code (0x40010004)
Error,25/07/2011 4:43:19 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:42:46 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:26:56 PM,Microsoft-Windows-SecuritySPP,903,None,"The Software Protection service has stopped.
"
Information,25/07/2011 4:22:27 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,25/07/2011 4:21:56 PM,Microsoft-Windows-SecuritySPP,902,None,"The Software Protection service has started.
6.1.7600.16385"
Information,25/07/2011 4:21:56 PM,Microsoft-Windows-SecuritySPP,1003,None,"The Software Protection service has completed licensing status
check.
Application Id=55c92734-d682-4d71-983e-d6ec3f16059f
Licensing Status=
1: 022a1afb-b893-4190-92c3-8f69a49839fb, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
2: 7cfd4696-69a9-4af7-af36-ff3d12b6b6c8, 1, 1 [(0 [0x00000000, 1, 0],
[(?)(?)( 1 0x00000000 0 0 msft:rm/algorithm/bios/4.0 0x00000000
0)(?)(?)(?)])(1 )(2 )]
3: a0cde89c-3304-4157-b61c-c8ad785d1fad, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
4: ac96e1a8-6cc4-4310-a4ff-332ce77fb5b8, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
5: cfb3e52c-d707-4861-af51-11b27ee6169c, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
6: 4a8149bb-7d61-49f4-8822-82c7bf88d64b, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
7: afd5f68f-b70f-4000-a21d-28dbc8be8b07, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
"
Information,25/07/2011 4:21:56 PM,Microsoft-Windows-SecuritySPP,1066,None,"Initialization status for service objects.
C:\Windows\system32\sppwinob.dll, msft:spp/windowsfunctionality/agent/7.0,
0x00000000, 0x00000000
C:\Windows\system32\sppobjs.dll, msft:rm/algorithm/phone/1.0, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:rm/algorithm/pkey/2005, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:spp/TaskScheduler/1.0, 0x00000000,
0x00000000
C:\Windows\system32\sppobjs.dll, msft:spp/volume/services/kms/1.0,
0x00000000, 0x00000000
C:\Windows\system32\sppobjs.dll,
msft:spp/volume/services/kms/licenserenewal/1.0, 0x00000000, 0x00000000
"
Information,25/07/2011 4:21:55 PM,SecurityCenter,1,None,The Windows Security
Center Service has started.
Information,25/07/2011 4:21:55 PM,sprtsvc_dellsupportcenter,1,None,"The
description for Event ID 1 from source sprtsvc_dellsupportcenter cannot be
found. Either the component that raises this event is not installed on your
local computer or the installation is corrupted. You can install or repair
the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:21:54 PM,Microsoft-Windows-SecuritySPP,900,None,"The Software Protection service is starting.
"
Information,25/07/2011 4:21:52 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:20:49 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:20:47 PM,Microsoft-Windows-Search,1003,Search
service,The Windows Search Service started.
Information,25/07/2011 4:20:42 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:20:31 PM,Windows Error Reporting,1001,None,"Fault
bucket 7968693, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERADEA.tmp.appcompat.txt
C:\WINDOWS\Temp\WERAE39.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERAE59.tmp.hdmp
C:\WINDOWS\Temp\WERB176.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WLANExt.exe_52ef4
7a1dc572c89e0206ac510ed1ee393dc736_143d5456
Analysis symbol:
Rechecking for solution: 0
Report Id: 71beaefe-b6fb-11e0-9d26-005056c00008
Report Status: 0"
Information,25/07/2011 4:20:31 PM,Windows Error Reporting,1001,None,"Fault
bucket 8741692, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: EvtEng.exe
P2: 13.0.0.0
P3: 4ab80b1f
P4: EvtEng.exe
P5: 13.0.0.0
P6: 4ab80b1f
P7: 40000015
P8: 00000000000c06ae
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERA784.tmp.appcompat.txt
C:\WINDOWS\Temp\WERC3EB.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERC43A.tmp.hdmp
C:\WINDOWS\Temp\WERC525.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_EvtEng.exe_d24eff
3b33562b4f23974f82f7744f564ea28bf5_161d53e9
Analysis symbol:
Rechecking for solution: 0
Report Id: 70be794d-b6fb-11e0-9d26-005056c00008
Report Status: 0"
Error,25/07/2011 4:20:31 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:20:24 PM,ESENT,302,Logging/Recovery,Windows (5752)
Windows: The database engine has successfully completed recovery steps.
Information,25/07/2011 4:20:21 PM,ESENT,301,Logging/Recovery,Windows (5752)
Windows: The database engine has begun replaying logfile
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log.
Information,25/07/2011 4:20:18 PM,ESENT,301,Logging/Recovery,Windows (5752)
Windows: The database engine has begun replaying logfile
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS001DA.log.
Information,25/07/2011 4:20:17 PM,ESENT,300,Logging/Recovery,Windows (5752)
Windows: The database engine is initiating recovery steps.
Information,25/07/2011 4:20:15 PM,ESENT,102,General,Windows (5752) Windows:
The database engine (6.01.7600.0000) started a new instance (0).
Error,25/07/2011 4:20:01 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:20:01 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:55 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: EvtEng.exe
P2: 13.0.0.0
P3: 4ab80b1f
P4: EvtEng.exe
P5: 13.0.0.0
P6: 4ab80b1f
P7: 40000015
P8: 00000000000c06ae
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERA784.tmp.appcompat.txt
C:\WINDOWS\Temp\WERC3EB.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERC43A.tmp.hdmp
C:\WINDOWS\Temp\WERC525.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_EvtEng.exe_d24eff3b
33562b4f23974f82f7744f564ea28bf5_cab_1068c5fc
Analysis symbol:
Rechecking for solution: 0
Report Id: 70be794d-b6fb-11e0-9d26-005056c00008
Report Status: 4"
Error,25/07/2011 4:19:50 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:50 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERADEA.tmp.appcompat.txt
C:\WINDOWS\Temp\WERAE39.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERAE59.tmp.hdmp
C:\WINDOWS\Temp\WERB176.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WLANExt.exe_52ef47a
1dc572c89e0206ac510ed1ee393dc736_cab_1004b26d
Analysis symbol:
Rechecking for solution: 0
Report Id: 71beaefe-b6fb-11e0-9d26-005056c00008
Report Status: 4"
Error,25/07/2011 4:19:50 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 4:19:49 PM,Application Error,1000,(100),"Faulting
application name: WLANExt.exe, version: 6.1.7600.16385, time stamp:
0x4a5bcc33
Faulting module name: msvcrt.dll, version: 7.0.7600.16385, time stamp:
0x4a5bdfbe
Exception code: 0x40000015
Fault offset: 0x000000000002aa8e
Faulting process id: 0x714
Faulting application start time: 0x01cc4b0827aa5024
Faulting application path: C:\Windows\system32\WLANExt.exe
Faulting module path: C:\Windows\system32\msvcrt.dll
Report Id: 71beaefe-b6fb-11e0-9d26-005056c00008"
Information,25/07/2011 4:19:49 PM,HPSLPSVC,0,None,"The description for Event
ID 0 from source HPSLPSVC cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:49 PM,hpqcxs08,0,None,"The description for Event
ID 0 from source hpqcxs08 cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,25/07/2011 4:19:48 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:48 PM,Pure Networks Platform
Service,1,None,"Service successfully started.
"
Error,25/07/2011 4:19:47 PM,Application Error,1000,(100),"Faulting
application name: EvtEng.exe, version: 13.0.0.0, time stamp: 0x4ab80b1f
Faulting module name: EvtEng.exe, version: 13.0.0.0, time stamp: 0x4ab80b1f
Exception code: 0x40000015
Fault offset: 0x00000000000c06ae
Faulting process id: 0x7bc
Faulting application start time: 0x01cc4b0829157906
Faulting application path: C:\Program Files\Intel\WiFi\bin\EvtEng.exe
Faulting module path: C:\Program Files\Intel\WiFi\bin\EvtEng.exe
Report Id: 70be794d-b6fb-11e0-9d26-005056c00008"
Information,25/07/2011 4:19:47 PM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0725161941457_g_00000_41.x
Information,25/07/2011 4:19:46 PM,McLogEvent,5000,None,"McShield service
started.
Engine version : 5400.1158
DAT version : 6417.0000
Number of signatures in EXTRA.DAT : None
Names of threats that EXTRA.DAT can detect : None"
Error,25/07/2011 4:19:42 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:42 PM,IAANTmon,7500,None,Intel RAID Controller:
Unknown Controller
Number of Serial ATA ports: 3
RAID Option ROM Version: Unknown
Driver Version: 8.9.0.1023
RAID Plug-In Version: 8.9.0.1023
Language Resource Version of the RAID Plug-In: File not found
Create Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Create Volume Wizard: File not found
Create Volume from Existing Hard Drive Wizard Version: 8.9.0.1023
Language Resource Version of the Create Volume from Existing Hard Drive
Wizard: File not found
Modify Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Modify Volume Wizard: File not found
Delete Volume Wizard Version: 8.9.0.1023
Language Resource Version of the Delete Volume Wizard: File not found
ISDI Library Version: 8.9.0.1023
Event Monitor User Notification Tool Version: 8.9.0.1023
Language Resource Version of the Event Monitor User Notification Tool: File
not found
Event Monitor Version: 8.9.0.1023
Hard Drive 0
Usage: Unknown hard drive usage
Status: Normal
Device Port: 0
Device Port Location: Internal
Current Serial ATA Transfer Mode: Generation 2
Model: WDC WD6400BEVT-75A0RT0
Serial Number: WD-WX21A3060432
Firmware: 01.01A01
Native Command Queuing Support: Yes
System Hard Drive: Yes
Size: 596.1 GB
Physical Sector Size: 512 Bytes
Logical Sector Size: 512 Bytes
Unused Port 0
Device Port: 5
Device Port Location: External
CD/DVD Drive 0
Device Port: 1
Device Port Location: Internal
Current Serial ATA Transfer Mode: Generation 1
Model: HL-DT-ST DVDRW/BDROM CA10N
Serial Number: K0ZA46D4626
Firmware: A110
Error,25/07/2011 4:19:42 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:41 PM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Information,25/07/2011 4:19:40 PM,Microsoft-Windows-Winlogon,6000,None,The
winlogon notification subscriber <SessionEnv> was unavailable to handle a
notification event.
Information,25/07/2011 4:19:40 PM,Microsoft-WindowsWinlogon,4101,None,Windows license validated.
Error,25/07/2011 4:19:40 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:36 PM,Microsoft-Windows-WMI,5617,None,Windows
Management Instrumentation Service subsystems initialized successfully
Information,25/07/2011 4:19:34 PM,YahooAUService,0,None,"The description for
Event ID 0 from source YahooAUService cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:34 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
WLIDInitializationTimerQueue. QueueWorkItem started (19:34:590)
"
Information,25/07/2011 4:19:34 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
g_ WLIDInitializationTimerQueue.Initialize started (19:34:590)
"
Information,25/07/2011 4:19:34 PM,SignInAssistant,0,None,"The description for
Event ID 0 from source SignInAssistant cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
g_WLIDTimerQueue.Initialize started (19:34:588)
"
Information,25/07/2011 4:19:34 PM,VMware NAT Service,1000,None,Using
configuration file: C:\ProgramData\VMware\vmnetnat.conf.
IP address: 192.168.140.2
Subnet: 255.255.255.0
External IP address: 0.0.0.0
Device: VMnet8.
MAC address: 00:50:56:FC:0F:25.
Ignoring host MAC address: 00:50:56:C0:00:08.
Information,25/07/2011 4:19:34 PM,Microsoft-Windows-WMI,5615,None,Windows
Management Instrumentation Service started sucessfully
Information,25/07/2011 4:19:34 PM,VMware NAT Service,1000,None,Service
started
Information,25/07/2011 4:19:34 PM,SeaPort,0,None,Service started
Information,25/07/2011 4:19:33 PM,RegSrvc,0,None,"The description for Event
ID 0 from source RegSrvc cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,25/07/2011 4:19:33 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:19:32 PM,hpqddsvc,0,None,"The description for Event
ID 0 from source hpqddsvc cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:31 PM,EvtEng,0,None,"The description for Event ID
0 from source EvtEng cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:30 PM,btwdins,0,None,"The description for Event
ID 0 from source btwdins cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:30 PM,AdobeARMservice,0,None,"The description for
Event ID 0 from source AdobeARMservice cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,25/07/2011 4:19:27 PM,Microsoft-Windows-User Profiles
Service,1531,None,"The User Profile Service has started successfully.
"
Information,25/07/2011 4:19:27 PM,Microsoft-Windows-EventSystem,4625,None,The
EventSystem sub system is suppressing duplicate event log entries for a
duration of 86400 seconds. The suppression timeout can be controlled by a
REG_DWORD value named SuppressDuplicateDuration under the following registry
key: HKLM\Software\Microsoft\EventSystem\EventLog.
Error,25/07/2011 4:19:27 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:18:37 PM,Microsoft-Windows-User Profiles
Service,1532,None,"The User Profile Service has stopped.
"
Warning,25/07/2011 4:18:25 PM,Microsoft-Windows-User Profiles
Service,1530,None,"Windows detected your registry file is still in use by
other applications or services. The file will be unloaded now. The
applications or services that hold your registry file may not function
properly afterwards.
DETAIL 2 user registry handles leaked from \Registry\User\S-1-5-21-32493416973537190303-2455221922-1001:
Process 1372 (\Device\HarddiskVolume3\WINDOWS\System32\svchost.exe) has
opened key \REGISTRY\USER\S-1-5-21-3249341697-3537190303-24552219221001\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Process 1372 (\Device\HarddiskVolume3\WINDOWS\System32\svchost.exe) has
opened key \REGISTRY\USER\S-1-5-21-3249341697-3537190303-24552219221001\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
"
Information,25/07/2011 4:18:26 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 4:18:25 PM,Microsoft-Windows-Winlogon,6000,None,The
winlogon notification subscriber <SessionEnv> was unavailable to handle a
notification event.
Information,25/07/2011 4:18:25 PM,Desktop Window Manager,9009,None,The
Desktop Window Manager has exited with code (0x40010004)
Information,25/07/2011 4:03:02 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:02:55 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 4:01:54 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:01:52 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 4:01:52 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 4:01:46 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 4:01:46 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:59:40 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:59:34 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:58:41 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:58:33 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:58:32 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 3:56:14 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 3:56:06 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:56:05 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:54:46 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:54:40 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:53:47 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:53:40 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:53:38 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 3:46:30 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 3:46:21 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:46:20 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:42:26 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:42:18 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:41:22 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:41:18 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:41:17 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 3:40:52 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 3:40:46 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:40:46 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:38:01 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:37:51 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:36:57 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:36:51 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:36:49 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,25/07/2011 3:36:47 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 3:36:38 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:36:37 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:35:19 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:35:13 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:34:15 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 3:34:12 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:34:11 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:34:05 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:34:05 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:34:00 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:33:54 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:32:56 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Warning,25/07/2011 3:32:55 PM,Microsoft-WindowsApplicationExperienceInfrastructure,1,None,"The application (Visual Studio
2005, from vendor Microsoft) has the following problem: Visual Studio 2005
has a known compatibility issue with this version of Windows."
Error,25/07/2011 3:32:53 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:32:52 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:32:46 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:32:45 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:31:17 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:31:10 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:31:00 PM,gusvc,0,None,"The description for Event ID
0 from source gusvc cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,25/07/2011 3:30:11 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 3:30:09 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:30:07 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 3:30:07 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,25/07/2011 3:30:02 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 3:30:02 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 2:25:42 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 12:48:35 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Warning,25/07/2011 12:47:51 PM,Microsoft-WindowsApplicationExperienceInfrastructure,1,None,"The application (Visual Studio
2005, from vendor Microsoft) has the following problem: Visual Studio 2005
has a known compatibility issue with this version of Windows."
Information,25/07/2011 12:41:19 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:41:12 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:40:12 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:40:10 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:40:10 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:40:05 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:40:04 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:40:01 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:39:54 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:39:52 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Information,25/07/2011 12:39:25 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:39:16 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:39:16 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:38:32 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:38:29 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:38:27 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:38:22 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:38:21 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:16:37 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:16:28 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:15:34 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:15:27 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:15:26 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Information,25/07/2011 12:15:23 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:15:20 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:15:20 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:15:15 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:15:14 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Information,25/07/2011 12:12:26 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:12:18 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:12:17 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:11:36 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 12:11:30 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:11:28 PM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Information,25/07/2011 12:11:26 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 12:11:17 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:11:16 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 11:56:19 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 11:56:11 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 11:55:16 AM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Error,25/07/2011 11:55:10 AM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 11:55:09 AM,Fast Access,1,FastAccess
Enabled,FastAccess Enabled due to Command
Information,25/07/2011 11:54:50 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 11:54:45 AM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 11:54:44 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,25/07/2011 9:59:12 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 9:57:44 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 9:57:34 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 9:56:40 AM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0725095633947_p_00000_00.x picid=0725095633150_g_00000_40.x
Information,25/07/2011 9:56:33 AM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Error,25/07/2011 9:56:18 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 9:56:17 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 9:56:12 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 12:57:58 AM,SideBySide,35,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sony\Media
Go\MediaGo.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sony\Media Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found
in manifest does not match the identity of the component requested. Reference
is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 12:56:57 AM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx
Systems\EA\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Error,25/07/2011 12:56:57 AM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx Systems\EA
Trial\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA Trial\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Information,25/07/2011 12:09:00 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:08:54 AM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,25/07/2011 12:07:57 AM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0725000752745_p_00000_00.x picid=0725000753933_g_00000_89.x
Information,25/07/2011 12:07:52 AM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Error,25/07/2011 12:07:41 AM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 12:07:40 AM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,25/07/2011 12:07:40 AM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,25/07/2011 12:03:01 AM,VSS,8224,None,The VSS service is shutting
down due to idle timeout.
Information,24/07/2011 10:00:50 PM,McLogEvent,5000,None,"McShield service
started.
Engine version : 5400.1158
DAT version : 6417.0000
Number of signatures in EXTRA.DAT : None
Names of threats that EXTRA.DAT can detect : None"
Information,24/07/2011 9:53:38 PM,Microsoft-Windows-Defrag,258,None,The disk
defragmenter successfully completed boot optimization on OS (C:)
Error,24/07/2011 9:44:09 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,24/07/2011 9:41:25 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,24/07/2011 9:41:19 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,24/07/2011 9:41:18 PM,gusvc,0,None,"The description for Event ID
0 from source gusvc cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Information,24/07/2011 9:13:32 PM,Windows Error Reporting,1001,None,"Fault
bucket 9, type 5
Event Name: NetworkDiagnosticsFrameworkV3
Response: Not available
Cab Id: 0
Problem signature:
P1: Microsoft
P2: AutoConfig Helper Class [1.0]
P3: 2
P4: 8008F906
P5: {07D37F7B-FA5E-4443-BDA7-AB107B29AFB9}
P6: AutoConfig Helper Class [1.0]
P7: {3DED64BC-233B-4ea8-89D6-7DADB3432FCB}
P8: netw5s64.sys
P9: 13.0.0.107 29/11/2009
P10:
Attached files:
C:\WINDOWS\System32\NDF\{E6F5A836-6793-4F3D-A82E-9F836477592B}-WER-072420112113.etl
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft_6c8a
aed6abb0ad298d86b8f8a08bbeb34de4ae_2ac0e105
Analysis symbol:
Rechecking for solution: 0
Report Id: 4a1eca0a-b65b-11e0-8ef1-005056c00008
Report Status: 0"
Information,24/07/2011 9:13:28 PM,Windows Error Reporting,1001,None,"Fault
bucket 7968693, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WER97F5.tmp.appcompat.txt
C:\WINDOWS\Temp\WER9853.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WER9873.tmp.hdmp
C:\WINDOWS\Temp\WER9C5B.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WLANExt.exe_52ef4
7a1dc572c89e0206ac510ed1ee393dc736_2bd0d468
Analysis symbol:
Rechecking for solution: 0
Report Id: 441bb321-b65b-11e0-8ef1-005056c00008
Report Status: 0"
Information,24/07/2011 9:13:24 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: NetworkDiagnosticsFrameworkV3
Response: Not available
Cab Id: 0
Problem signature:
P1: Microsoft
P2: AutoConfig Helper Class [1.0]
P3: 2
P4: 8008F906
P5: {07D37F7B-FA5E-4443-BDA7-AB107B29AFB9}
P6: AutoConfig Helper Class [1.0]
P7: {3DED64BC-233B-4ea8-89D6-7DADB3432FCB}
P8: netw5s64.sys
P9: 13.0.0.107 29/11/2009
P10:
Attached files:
C:\WINDOWS\System32\NDF\{E6F5A836-6793-4F3D-A82E-9F836477592B}-WER-072420112113.etl
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_Microsoft_6c8aae
d6abb0ad298d86b8f8a08bbeb34de4ae_cab_0e40c1c2
Analysis symbol:
Rechecking for solution: 0
Report Id: 4a1eca0a-b65b-11e0-8ef1-005056c00008
Report Status: 4"
Information,24/07/2011 9:13:14 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WER97F5.tmp.appcompat.txt
C:\WINDOWS\Temp\WER9853.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WER9873.tmp.hdmp
C:\WINDOWS\Temp\WER9C5B.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WLANExt.exe_52ef47a
1dc572c89e0206ac510ed1ee393dc736_cab_0c209d23
Analysis symbol:
Rechecking for solution: 0
Report Id: 441bb321-b65b-11e0-8ef1-005056c00008
Report Status: 4"
Error,24/07/2011 9:13:13 PM,Application Error,1000,(100),"Faulting
application name: WLANExt.exe, version: 6.1.7600.16385, time stamp:
0x4a5bcc33
Faulting module name: msvcrt.dll, version: 7.0.7600.16385, time stamp:
0x4a5bdfbe
Exception code: 0x40000015
Fault offset: 0x000000000002aa8e
Faulting process id: 0x1bf8
Faulting application start time: 0x01cc4a680152e2a0
Faulting application path: C:\Windows\system32\WLANExt.exe
Faulting module path: C:\Windows\system32\msvcrt.dll
Report Id: 441bb321-b65b-11e0-8ef1-005056c00008"
Error,24/07/2011 9:12:56 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 8:06:21 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,24/07/2011 8:05:06 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,24/07/2011 8:04:59 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Warning,24/07/2011 8:04:42 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Warning,24/07/2011 8:04:33 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80040801. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80040801. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80040801. Http status code 0.
trying WinHTTP.
Send request returned 0x80040801. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80040801. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Information,24/07/2011 8:04:03 PM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0724200358314_g_00000_72.x
Information,24/07/2011 8:03:58 PM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Error,24/07/2011 8:03:53 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 8:03:53 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 8:03:52 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 7:49:17 PM,Windows Backup,4103,None,The backup did not
complete because of an error writing to the backup location E:\. The error
is: The backup location cannot be found or is not valid. Review your backup
settings and check the backup location. (0x81000006).
Information,24/07/2011 7:49:16 PM,Windows Backup,4097,None,Backup has
started. Backup location: E:\.
Error,24/07/2011 7:49:15 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 7:49:14 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,24/07/2011 7:49:14 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\kPrism.pst has detected a
catalog checkpoint.
Error,24/07/2011 7:49:14 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,24/07/2011 7:49:09 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\archive.pst has detected a
catalog checkpoint.
Information,24/07/2011 7:49:09 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\Outlook.pst has detected a
catalog checkpoint.
Warning,24/07/2011 1:30:23 AM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Error,24/07/2011 1:00:01 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,24/07/2011 1:00:00 AM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Warning,24/07/2011 12:57:20 AM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Warning,24/07/2011 12:30:20 AM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Information,24/07/2011 12:16:06 AM,VSS,8224,None,The VSS service is shutting
down due to idle timeout.
Warning,23/07/2011 11:57:20 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Error,23/07/2011 11:31:30 PM,SideBySide,35,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sony\Media
Go\MediaGo.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sony\Media Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found
in manifest does not match the identity of the component requested. Reference
is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 11:31:14 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx
Systems\EA\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Error,23/07/2011 11:31:14 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx Systems\EA
Trial\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA Trial\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Warning,23/07/2011 11:30:20 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
"
Warning,23/07/2011 10:57:30 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Error,23/07/2011 10:53:42 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 10:52:53 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 10:52:42 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 10:45:25 PM,SideBySide,35,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sony\Media
Go\MediaGo.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sony\Media Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found
in manifest does not match the identity of the component requested. Reference
is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 10:43:14 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx
Systems\EA\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Error,23/07/2011 10:43:14 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx Systems\EA
Trial\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA Trial\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Warning,23/07/2011 10:29:52 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Error,23/07/2011 10:25:01 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx
Systems\EA\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Error,23/07/2011 10:25:01 PM,SideBySide,59,None,"Activation context
generation failed for ""C:\Program Files (x86)\Sparx Systems\EA
Trial\SSInvoke.exe"".Error in manifest or policy file ""C:\Program Files
(x86)\Sparx Systems\EA Trial\SSInvoke.exe"" on line 21. Invalid Xml syntax."
Warning,23/07/2011 9:56:52 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Error,23/07/2011 9:46:02 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,23/07/2011 9:45:21 PM,VSS,8224,None,The VSS service is shutting
down due to idle timeout.
Error,23/07/2011 9:44:22 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,23/07/2011 9:43:41 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,23/07/2011 9:43:31 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Warning,23/07/2011 9:43:12 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying WinHTTP.
Send request returned 0x80072ee7. Http status code 0.
trying CUP:iexplore.
Send request returned 0x80004005. Http status code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Information,23/07/2011 9:42:38 PM,Fast Access,1,Password used for
authentication,User kPrismH\Horia password used for authentication.
picid=0723214230768_p_00000_00.x picid=0723214231673_g_00000_21.x
Information,23/07/2011 9:42:31 PM,Fast Access,1,Biometric data updated,User
kPrismH\Horia biometric data updated.
Warning,23/07/2011 9:42:28 PM,Google Update,20,None,"The description for
Event ID 20 from source Google Update cannot be found. Either the component
that raises this event is not installed on your local computer or the
installation is corrupted. You can install or repair the component on the
local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Network Request Error.
Error: 0x80072ee7. Http status code: 0.
Url=https://tools.google.com/service/update2
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80040801. Http status
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80040801. Http status
trying WinHTTP.
Send request returned 0x80040801. Http status
trying CUP:iexplore.
Send request returned 0x80040801. Http status
Trying config: source=IE, direct connection.
trying CUP:WinHTTP.
Send request returned 0x80072ee7. Http status
trying WinHTTP.
Send request returned 0x80072ee7. Http status
trying CUP:iexplore.
Send request returned 0x80004005. Http status
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
code 0.
Trying config: source=auto, wpad=1, script=.
trying CUP:WinHTTP.
Send request returned 0x80072ee7.
"
Information,23/07/2011 9:41:55 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,23/07/2011 9:41:49 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,23/07/2011 9:41:45 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,23/07/2011 9:41:44 PM,gusvc,0,None,"The description for Event ID
0 from source gusvc cannot be found. Either the component that raises this
event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service started
"
Error,23/07/2011 9:41:41 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 9:41:40 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 9:41:38 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,23/07/2011 5:28:37 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\kPrism.pst has detected a
catalog checkpoint.
Information,23/07/2011 5:28:37 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\Outlook.pst has detected a
catalog checkpoint.
Error,23/07/2011 5:28:36 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 5:28:36 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 5:28:32 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 5:28:32 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,23/07/2011 5:28:31 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,23/07/2011 5:28:31 PM,Outlook,32,None,The store
C:\Users\Horia\AppData\Local\Microsoft\Outlook\archive.pst has detected a
catalog checkpoint.
Error,22/07/2011 11:00:02 PM,SideBySide,33,None,"Activation context
generation failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 7:59:24 PM,VSS,8224,None,The VSS service is shutting
down due to idle timeout.
Error,22/07/2011 7:56:24 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 7:14:49 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 7:14:40 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 7:13:45 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,22/07/2011 7:13:39 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 7:13:38 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,22/07/2011 7:13:02 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Error,22/07/2011 7:12:55 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 7:12:55 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 7:12:52 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 7:12:44 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 7:11:51 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,22/07/2011 7:11:43 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,22/07/2011 7:04:30 PM,SideBySide,35,None,"Activation context generation
failed for ""C:\Program Files (x86)\Sony\Media Go\MediaGo.exe"".Error in
manifest or policy file ""C:\Program Files (x86)\Sony\Media
Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found in manifest does
not match the identity of the component requested. Reference is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 7:04:18 PM,SideBySide,35,None,"Activation context generation
failed for ""C:\Program Files (x86)\Sony\Media Go\MediaGo.exe"".Error in
manifest or policy file ""C:\Program Files (x86)\Sony\Media
Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found in manifest does
not match the identity of the component requested. Reference is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 7:01:59 PM,SideBySide,35,None,"Activation context generation
failed for ""C:\Program Files (x86)\Sony\Media Go\MediaGo.exe"".Error in
manifest or policy file ""C:\Program Files (x86)\Sony\Media
Go\Sony.Mrs.MANIFEST"" on line 3. Component identity found in manifest does
not match the identity of the component requested. Reference is
Sony.Mrs,processorArchitecture=""AMD64"",type=""win32"",version=""2.2.0.0"".
Definition is
Sony.Mrs,processorArchitecture=""x86"",type=""win32"",version=""2.2.0.0"".
Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 6:55:08 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 6:53:15 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 6:53:06 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 6:52:10 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,22/07/2011 6:52:03 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Error,22/07/2011 6:51:10 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 6:50:39 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 6:41:57 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 6:41:57 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Error,22/07/2011 6:41:56 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 6:32:03 PM,Windows Error Reporting,1001,None,"Fault
bucket 452704182, type 5
Event Name: ScriptedDiagFailure
Response: Not available
Cab Id: 0
Problem signature:
P1: Microsoft Windows.NetworkDiagnostics.1.0
P2: Default
P3: 1.0.0.0
P4: Default
P5:
P6:
P7:
P8:
P9:
P10:
Attached files:
C:\Users\Horia\AppData\Local\Temp\msdt\_0983570E-30B8-4CF1-BB4A279D51FBDB4D_\Pkg1BDA.cab
These files may be available here:
C:\Users\Horia\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_
Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_10544347
Analysis symbol:
Rechecking for solution: 0
Report Id: 65807312-b4b2-11e0-8ef1-005056c00008
Report Status: 0"
Information,22/07/2011 6:31:53 PM,Windows Error Reporting,1001,None,"Fault
bucket , type 0
Event Name: ScriptedDiagFailure
Response: Not available
Cab Id: 0
Problem signature:
P1: Microsoft Windows.NetworkDiagnostics.1.0
P2: Default
P3: 1.0.0.0
P4: Default
P5:
P6:
P7:
P8:
P9:
P10:
Attached files:
C:\Users\Horia\AppData\Local\Temp\msdt\_0983570E-30B8-4CF1-BB4A279D51FBDB4D_\Pkg1BDA.cab
These files may be available here:
C:\Users\Horia\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_Mi
crosoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_cab_1b881c76
Analysis symbol:
Rechecking for solution: 0
Report Id: 65807312-b4b2-11e0-8ef1-005056c00008
Report Status: 4"
Error,22/07/2011 6:31:46 PM,SideBySide,33,None,"Activation context generation
failed for ""C:\Windows\system32\conhost.exe"". Dependent Assembly
Microsoft.Windows.SystemCompatible,processorArchitecture=""amd64"",publicKeyT
oken=""6595b64144ccf1df"",type=""win32"",version=""6.0.7600.16823"" could not
be found. Please use sxstrace.exe for detailed diagnosis."
Information,22/07/2011 5:55:25 PM,MsiInstaller,1033,None,Windows Installer
installed the product. Product Name: Junos Pulse. Product Version: 2.0.11013.
Product Language: 1033. Manufacturer: Juniper Networks. Installation success
or error status: 1603.
Information,22/07/2011 5:55:25 PM,MsiInstaller,11708,None,Product: Junos
Pulse -- Installation operation failed.
Information,22/07/2011 5:51:18 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 5:51:12 PM,Fast Access,1,FastAccess
Disabled,FastAccess Disabled due to Command
Information,22/07/2011 5:50:16 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,22/07/2011 5:50:10 PM,Fast Access,1,FastAccess Enabled,FastAccess
Enabled due to Command
Information,22/07/2011 5:40:51 PM,Windows Error Reporting,1001,None,"Fault
bucket 7968693, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: WLANExt.exe
P2: 6.1.7600.16385
P3: 4a5bcc33
P4: msvcrt.dll
P5: 7.0.7600.16385
P6: 4a5bdfbe
P7: 40000015
P8: 000000000002aa8e
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERB46F.tmp.appcompat.txt
C:\WINDOWS\Temp\WERB490.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERB4B0.tmp.hdmp
C:\WINDOWS\Temp\WERB6A4.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WLANExt.exe_52ef4
7a1dc572c89e0206ac510ed1ee393dc736_044d63a2
Analysis symbol:
Rechecking for solution: 0
Report Id: 55020554-b4a9-11e0-8ef1-005056c00008
Report Status: 0"
Information,22/07/2011 5:40:41 PM,Windows Error Reporting,1001,None,"Fault
bucket 22665803, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: svchost.exe
P2: 6.1.7600.16385
P3: 4a5bc3c1
P4: ole32.dll
P5: 6.1.7600.16624
P6: 4c2984e3
P7: c0000005
P8: 00000000000324aa
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WER333F.tmp.appcompat.txt
C:\WINDOWS\Temp\WER3350.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WER3351.tmp.hdmp
C:\WINDOWS\Temp\WER33A0.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_svchost.exe_535bc
e948c7b321db07149b1a31be97e52c64bc6_044d3d2e
Analysis symbol:
Rechecking for solution: 0
Report Id: 2c8ed303-b4a9-11e0-a789-005056c00008
Report Status: 0"
Information,22/07/2011 5:40:31 PM,Windows Error Reporting,1001,None,"Fault
bucket 8741692, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: EvtEng.exe
P2: 13.0.0.0
P3: 4ab80b1f
P4: EvtEng.exe
P5: 13.0.0.0
P6: 4ab80b1f
P7: 40000015
P8: 00000000000c06ae
P9:
P10:
Attached files:
C:\WINDOWS\Temp\WERA69A.tmp.appcompat.txt
C:\WINDOWS\Temp\WERAA34.tmp.WERInternalMetadata.xml
C:\WINDOWS\Temp\WERAA35.tmp.hdmp
C:\WINDOWS\Temp\WERAB5E.tmp.mdmp
These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_EvtEng.exe_d24eff
3b33562b4f23974f82f7744f564ea28bf5_044d168c
Analysis symbol:
Rechecking for solution: 0
Report Id: 52e2edf0-b4a9-11e0-8ef1-005056c00008
Report Status: 0"
Information,22/07/2011 5:36:48 PM,VSS,8224,None,The VSS service is shutting
down due to idle timeout.
Information,22/07/2011 5:36:34 PM,Microsoft-WindowsRestartManager,10001,None,Ending session 0 started 2011-0722T21:32:41.617878600Z.
Information,22/07/2011 5:36:34 PM,MsiInstaller,1042,None,Ending a Windows
Installer transaction: C:\Users\Horia\AppData\Local\Temp\Temp1_j-pulse-win-2
0r3-b11013-64bitinstaller (2).zip\j-pulse-win-2.0r3-b1101364bitinstaller.msi. Client Process Id: 7652.
Information,22/07/2011 5:34:24 PM,Microsoft-Windows-SecuritySPP,903,None,"The Software Protection service has stopped.
"
Information,22/07/2011 5:33:42 PM,VSS,8220,None,Ran out of time while
deleting files.
Operation:
OnPostSnapshot event
PostSnapshot Event
Context:
Execution Context: Shadow Copy Optimization Writer
Execution Context: Writer
Writer Class Id: {4dc3bdd4-ab48-4d07-adb0-3bee2926fd7f}
Writer Name: Shadow Copy Optimization Writer
Writer Instance ID: {2f9f3c78-3c45-425e-aa61-f0f3d2c3e707}
Information,22/07/2011 5:33:10 PM,VSS,8219,None,Ran out of time while
expanding file specification
\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy13\Windows\softwaredistribution
\*.*. This was being done for the WUA subscriber.
Operation:
OnPostSnapshot event
PostSnapshot Event
Context:
Execution Context: Shadow Copy Optimization Writer
Execution Context: Writer
Writer Class Id: {4dc3bdd4-ab48-4d07-adb0-3bee2926fd7f}
Writer Name: Shadow Copy Optimization Writer
Writer Instance ID: {2f9f3c78-3c45-425e-aa61-f0f3d2c3e707}
Information,22/07/2011 5:33:10 PM,VSS,8219,None,Ran out of time while
expanding file specification
\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy13\Windows\softwaredistribution
\Download\*.*. This was being done for the WUA subscriber.
Operation:
OnPostSnapshot event
PostSnapshot Event
Context:
Execution Context: Shadow Copy Optimization Writer
Execution Context: Writer
Writer Class Id: {4dc3bdd4-ab48-4d07-adb0-3bee2926fd7f}
Writer Name: Shadow Copy Optimization Writer
Writer Instance ID: {2f9f3c78-3c45-425e-aa61-f0f3d2c3e707}
Information,22/07/2011 5:33:10 PM,VSS,8219,None,Ran out of time while
expanding file specification
\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy13\Windows\softwaredistribution
\Download\488053cdbca3231eeb2c2af7236d09ed\*.*. This was being done for the
WUA subscriber.
Operation:
OnPostSnapshot event
PostSnapshot Event
Context:
Execution Context: Shadow Copy Optimization Writer
Execution Context: Writer
Writer Class Id: {4dc3bdd4-ab48-4d07-adb0-3bee2926fd7f}
Writer Name: Shadow Copy Optimization Writer
Writer Instance ID: {2f9f3c78-3c45-425e-aa61-f0f3d2c3e707}
Information,22/07/2011 5:32:41 PM,Microsoft-WindowsRestartManager,10000,None,Starting session 0 - 2011-0722T21:32:41.617878600Z.
Information,22/07/2011 5:32:33 PM,System Restore,8194,None,Successfully
created restore point (Process = C:\Windows\system32\msiexec.exe /V;
Description = Installed Junos Pulse.).
Information,22/07/2011 5:32:07 PM,MsiInstaller,1040,None,Beginning a Windows
Installer transaction: C:\Users\Horia\AppData\Local\Temp\Temp1_j-pulse-win-2
0r3-b11013-64bitinstaller (2).zip\j-pulse-win-2.0r3-b1101364bitinstaller.msi. Client Process Id: 7652.
Information,22/07/2011 5:29:40 PM,gupdate,0,None,"The description for Event
ID 0 from source gupdate cannot be found. Either the component that raises
this event is not installed on your local computer or the installation is
corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to
be saved with the event.
The following information was included with the event:
Service stopped
"
Information,22/07/2011 5:29:23 PM,Microsoft-Windows-SecuritySPP,902,None,"The Software Protection service has started.
6.1.7600.16385"
Information,22/07/2011 5:29:23 PM,Microsoft-Windows-SecuritySPP,1003,None,"The Software Protection service has completed licensing status
check.
Application Id=55c92734-d682-4d71-983e-d6ec3f16059f
Licensing Status=
1: 022a1afb-b893-4190-92c3-8f69a49839fb, 1, 0 [(0 [0xC004F014, 0, 0],
[(?)(?)(?)(?)(?)(?)])(1 )(2 )]
2: 7cfd4696-69a9-4af7-af36-ff3d12b6b6c8, 1, 1 [(0 [0x00000000, 1, 0],
[(?)(?)( 1 0x00000000 0 0 msft
Security_Events
Level Date and Time
Source
Event ID
Task Category
Information 25/07/2011 16:58 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:58 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:49 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:49 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:48 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:48 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
-
Logon
Package Name (NTLM only):
Key Length:
0
-
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\__vmware_user__
__vmware_user__
kPrismH
0x2020f3
{00000000-0000-0000-0000-000000000000}
SYSTEM
KPRISMH$
WORKGROUP
Process Information:
Process ID:
0xc64
Process Name:
C:\Program Files (x86)\VMware\VMware
Player\vmware-authd.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
__vmware_user__
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
0xc64
Process Name:
C:\Program Files (x86)\VMware\VMware
Player\vmware-authd.exe
Network Information:
Network Address:
Port:
-
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4724 User
Account Management
"An attempt was made to reset an account's password.
Subject:
Security ID:
Account Name:
SYSTEM
KPRISMH$
Account Domain:
Logon ID:
WORKGROUP
0x3e7
Target Account:
Security ID:
kPrismH\__vmware_user__
Account Name:
__vmware_user__
Account Domain:
kPrismH"
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4738
Account Management
"A user account was changed.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Target Account:
Security ID:
Account Name:
Account Domain:
kPrismH\__vmware_user__
__vmware_user__
kPrismH
Changed Attributes:
SAM Account Name: __vmware_user__
Display Name:
__vmware_user__
User Principal Name:
Home Directory:
<value not set>
Home Drive:
<value not set>
Script Path:
<value not set>
Profile Path:
<value not set>
User Workstations:
<value not set>
Password Last Set:
25/07/2011 4:45:55 PM
Account Expires:
<never>
Primary Group ID: 513
AllowedToDelegateTo:
Old UAC Value:
0x10
New UAC Value:
0x10
User Account Control:
User Parameters: SID History:
Logon Hours:
All
Additional Information:
Privileges:
-"
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
User
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
-
Logon
Package Name (NTLM only):
Key Length:
0
-
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:45 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
Logon
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 6406 Other
System Events
"McAfee Personal Firewall registered to Windows Firewall to
control filtering for the following:
BootTimeRuleCategory, FirewallRuleCategory."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x60301
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x60366
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x60301
Privileges:
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x60366
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Access\FAService.exe
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x404
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
-
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x60301
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Access\FAService.exe
0x404
SYSTEM
KPRISMH$
WORKGROUP
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
Process Name:
Access\FAService.exe
Network Information:
Network Address:
Port:
0x404
C:\Program Files (x86)\Sensible Vision\Fast
-
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
NULL SID
-
Account Domain:
Logon ID:
0x0
Logon Type:
3
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
ANONYMOUS LOGON
ANONYMOUS LOGON
NT AUTHORITY
0x5f03e
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
0x0
-
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
NtLmSsp
Authentication Package: NTLM
Transited Services:
Package Name (NTLM only):
NTLM V1
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
kPrismH\Horia
Horia
kPrismH
0x58e88
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x58eb2
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x364
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x58e88
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
0x364
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4648
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
Process Name:
Network Information:
Network Address:
Port:
0x364
C:\WINDOWS\System32\winlogon.exe
127.0.0.1
0
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
Logon
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 5024 Other
System Events
The Windows Firewall service started successfully.
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 5033 Other
System Events
The Windows Firewall Driver started successfully.
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Network Information:
Workstation Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Logon
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 5056
System Integrity "A cryptographic self test was performed.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Module:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
ncrypt.dll
Return Code:
0x0"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
LOCAL SERVICE
LOCAL SERVICE
NT AUTHORITY
0x3e5
Privileges:
SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
LOCAL SERVICE
LOCAL SERVICE
NT AUTHORITY
0x3e5
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
NETWORK SERVICE
NETWORK SERVICE
NT AUTHORITY
0x3e4
Privileges:
SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
NETWORK SERVICE
NETWORK SERVICE
NT AUTHORITY
0x3e4
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
SYSTEM
KPRISMH$
WORKGROUP
Logon
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2fc
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4902 Audit
Policy Change
"The Per-user audit policy table was created.
Number of Elements:
0
Policy ID: 0x2f7fd"
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x0
Logon Type:
0
NULL SID
-
Logon
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x4
Network Information:
Workstation Name: Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Authentication Package: Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:44 Microsoft-Windows-Security-Auditing 4608
Security State Change
"Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is
initialized."
Information 25/07/2011 16:43 Microsoft-Windows-Security-Auditing 4647
Logoff
"User initiated logoff:
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x5d2ba
This event is generated when a logoff is initiated. No further user-initiated
activity can occur. This event can be interpreted as a logoff event."
Information 25/07/2011 16:43 Microsoft-Windows-Eventlog
1100 Service
shutdown
The event logging service has shut down.
Information 25/07/2011 16:43 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:43 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:24 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:24 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Network Information:
Workstation Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Logon
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:22 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:22 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Logon
Logon Type:
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
5
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
SYSTEM
KPRISMH$
WORKGROUP
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\__vmware_user__
__vmware_user__
kPrismH
0x2b5036
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
0xc98
Process Name:
C:\Program Files (x86)\VMware\VMware
Player\vmware-authd.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
__vmware_user__
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
0xc98
Process Name:
C:\Program Files (x86)\VMware\VMware
Player\vmware-authd.exe
Network Information:
Network Address:
Port:
-
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4724 User
Account Management
"An attempt was made to reset an account's password.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Target Account:
Security ID:
kPrismH\__vmware_user__
Account Name:
__vmware_user__
Account Domain:
kPrismH"
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4738
Account Management
"A user account was changed.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Target Account:
Security ID:
Account Name:
Account Domain:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
kPrismH\__vmware_user__
__vmware_user__
kPrismH
Changed Attributes:
SAM Account Name: __vmware_user__
Display Name:
__vmware_user__
User Principal Name:
Home Directory:
<value not set>
Home Drive:
<value not set>
Script Path:
<value not set>
Profile Path:
<value not set>
User Workstations:
<value not set>
Password Last Set:
25/07/2011 4:20:43 PM
Account Expires:
<never>
Primary Group ID: 513
AllowedToDelegateTo:
Old UAC Value:
0x10
New UAC Value:
0x10
User Account Control:
User Parameters: SID History:
Logon Hours:
All
User
Additional Information:
Privileges:
-"
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:20 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Logon
Source Port:
-
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Logon
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 6406 Other
System Events
"McAfee Personal Firewall registered to Windows Firewall to
control filtering for the following:
BootTimeRuleCategory, FirewallRuleCategory."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x0
Logon Type:
3
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
ANONYMOUS LOGON
ANONYMOUS LOGON
NT AUTHORITY
0x78dbd
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
NULL SID
-
0x0
-
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
NtLmSsp
Authentication Package: NTLM
Transited Services:
Package Name (NTLM only):
NTLM V1
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x62bc6
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x62c07
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x62bc6
Privileges:
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
SYSTEM
KPRISMH$
WORKGROUP
kPrismH\Horia
Horia
kPrismH
Logon
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Access\FAService.exe
0x62c07
{00000000-0000-0000-0000-000000000000}
0x410
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x62bc6
{00000000-0000-0000-0000-000000000000}
SYSTEM
KPRISMH$
WORKGROUP
Process Information:
Process ID:
Process Name:
Access\FAService.exe
0x410
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
0x410
Process Name:
Access\FAService.exe
Network Information:
Network Address:
Port:
C:\Program Files (x86)\Sensible Vision\Fast
-
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x5d299
Privileges:
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x5d2ba
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
0x3f8
Logon
SYSTEM
KPRISMH$
WORKGROUP
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x5d299
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
0x3f8
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
Process Name:
Network Information:
Network Address:
Port:
0x3f8
C:\WINDOWS\System32\winlogon.exe
127.0.0.1
0
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Network Information:
Workstation Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Logon
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 5024 Other
System Events
The Windows Firewall service started successfully.
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 5033 Other
System Events
The Windows Firewall Driver started successfully.
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Logon
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon Type:
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
5
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 5056
System Integrity "A cryptographic self test was performed.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Module:
ncrypt.dll
Return Code:
0x0"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
Privileges:
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Network Information:
Workstation Name:
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Logon
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
LOCAL SERVICE
LOCAL SERVICE
NT AUTHORITY
0x3e5
Privileges:
SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
LOCAL SERVICE
LOCAL SERVICE
NT AUTHORITY
0x3e5
Logon
Logon GUID:
Process Information:
Process ID:
Process Name:
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
NETWORK SERVICE
NETWORK SERVICE
NT AUTHORITY
0x3e4
Privileges:
SeAssignPrimaryTokenPrivilege
SeAuditPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
Logon
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
NETWORK SERVICE
NETWORK SERVICE
NT AUTHORITY
0x3e4
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
5
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x2f4
C:\WINDOWS\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4902 Audit
Policy Change
"The Per-user audit policy table was created.
Number of Elements:
0
Policy ID: 0x2f869"
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x0
Logon Type:
0
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Process Information:
Process ID:
Process Name:
Logon
NULL SID
-
SYSTEM
SYSTEM
NT AUTHORITY
0x3e7
{00000000-0000-0000-0000-000000000000}
0x4
Network Information:
Workstation Name: Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Authentication Package: Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 16:19 Microsoft-Windows-Security-Auditing 4608
Security State Change
"Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is
initialized."
Information 25/07/2011 16:18 Microsoft-Windows-Eventlog
1100 Service
shutdown
The event logging service has shut down.
Information 25/07/2011 16:18 Microsoft-Windows-Security-Auditing 4647
Logoff
"User initiated logoff:
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x149a8f
This event is generated when a logoff is initiated. No further user-initiated
activity can occur. This event can be interpreted as a logoff event."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x10ab6df3
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x10ab6e8e
Logon Type:
2
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Privileges:
kPrismH\Horia
Horia
kPrismH
0x10ab6df3
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x10ab6e8e
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Access\FAService.exe
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x2c0
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
2
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x10ab6df3
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Access\FAService.exe
SYSTEM
KPRISMH$
WORKGROUP
0x2c0
C:\Program Files (x86)\Sensible Vision\Fast
Network Information:
Workstation Name: KPRISMH
Source Network Address: Source Port:
Detailed Authentication Information:
Logon Process:
Advapi
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4648
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
localhost
Additional Information: localhost
Process Information:
Process ID:
Process Name:
Access\FAService.exe
Network Information:
Network Address:
Port:
0x2c0
C:\Program Files (x86)\Sensible Vision\Fast
-
This event is generated when a process attempts to log on an account by
explicitly specifying that account’s credentials. This most commonly occurs
in batch-type configurations such as scheduled tasks, or when using the RUNAS
command."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x10ab6752
Logon Type:
7
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4634
Logoff
"An account was logged off.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x10ab677a
Logon Type:
7
This event is generated when a logon session is destroyed. It may be
positively correlated with a logon event using the Logon ID value. Logon IDs
are only unique between reboots on the same computer."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4672
Special Logon
"Special privileges assigned to new logon.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
kPrismH\Horia
Horia
kPrismH
0x10ab6752
Privileges:
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege"
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4624
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
7
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x10ab677a
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
Logon
SYSTEM
KPRISMH$
WORKGROUP
0x37c
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4624 Logon
"An account was successfully logged on.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
0x3e7
Logon Type:
7
New Logon:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
kPrismH\Horia
Horia
kPrismH
0x10ab6752
{00000000-0000-0000-0000-000000000000}
Process Information:
Process ID:
Process Name:
SYSTEM
KPRISMH$
WORKGROUP
0x37c
C:\WINDOWS\System32\winlogon.exe
Network Information:
Workstation Name: KPRISMH
Source Network Address: 127.0.0.1
Source Port:
0
Detailed Authentication Information:
Logon Process:
User32
Authentication Package: Negotiate
Transited Services:
Package Name (NTLM only):
Key Length:
0
This event is generated when a logon session is created. It is generated on
the computer that was accessed.
The subject fields indicate the account on the local system which requested
the logon. This is most commonly a service such as the Server service, or a
local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most
common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created,
i.e. the account that was logged on.
The network fields indicate where a remote logon request originated.
Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this
specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this
event with a KDC event.
- Transited services indicate which intermediate services have
participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM
protocols.
- Key length indicates the length of the generated session key. This
will be 0 if no session key was requested."
Information 25/07/2011 9:56
Microsoft-Windows-Security-Auditing 4648 Logon
"A logon was attempted using explicit credentials.
Subject:
Security ID:
Account Name:
Account Domain:
Logon ID:
Logon GUID:
SYSTEM
KPRISMH$
WORKGROUP
0x3e7
{00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name:
Horia
Account Domain:
kPrismH
Logon GUID:
{00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name:
Addition
localhost
Download