datetimetypeinfotext
26.03.201723.00.01EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x524f1 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: HAUGE7-PC Source Network Address: 10.0.2.2 Source Port: 0 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V2 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
26.03.201723.00.01EventSecurityAn account was logged off. Subject: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x524f1 Logon Type: 3 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
26.03.201723.00.02EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Information: Logon Type: 3 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x525bd Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: HAUGE7-PC Source Network Address: 10.0.2.2 Source Port: 0 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V2 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
26.03.201723.00.02ProcessStarted
26.03.201723.00.03ProcessStartedC:\Windows\system32\winlogon.exe
26.03.201723.00.05EventSecuritySpecial privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x53803 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege SeImpersonatePrivilege
26.03.201723.00.05EventSecuritySpecial privileges assigned to new logon. Subject: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x53890 Privileges: SeAssignPrimaryTokenPrivilege SeAuditPrivilege
26.03.201723.00.05EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x53890 Linked Logon ID: 0x53803 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xe28 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
26.03.201723.00.05EventSecurityA logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: DWM-2 Account Domain: Window Manager Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0xe28 Process Name: C:\Windows\System32\winlogon.exe Network Information: Network Address: - Port: - This event is generated when a process attempts to log on an account by explicitly specifying that account?s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
26.03.201723.00.05EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1842 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-90-0-2 Account Name: DWM-2 Account Domain: Window Manager Logon ID: 0x53803 Linked Logon ID: 0x53890 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0xe28 Process Name: C:\Windows\System32\winlogon.exe Network Information: Workstation Name: Source Network Address: - Source Port: - Detailed Authentication Information: Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
26.03.201723.00.05ProcessStartedC:\Windows\system32\dwm.exe
26.03.201723.00.06EventApplicationThe Desktop Window Manager has registered the session port.
26.03.201723.00.09EventSystemUser Logon Notification for Customer Experience Improvement Program
26.03.201723.00.09EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 10 Restricted Admin Mode: %%1843 Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x57901 Linked Logon ID: 0x0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe Network Information: Workstation Name: DESKTOP-KV0DOUH Source Network Address: 10.0.2.2 Source Port: 0 Detailed Authentication Information: Logon Process: User32 Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
26.03.201723.00.09EventSecurityA logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe Network Information: Network Address: 10.0.2.2 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account?s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
26.03.201723.00.12EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe
26.03.201723.00.12ProcessStartedC:\Windows\System32\rdpclip.exe
26.03.201723.00.12ProcessStartedC:\Windows\system32\svchost.exe
26.03.201723.00.12ProcessStartedC:\Windows\system32\sihost.exe
26.03.201723.00.12ProcessStartedC:\Windows\system32\taskhostw.exe
26.03.201723.00.13EventSystemThe description for Event ID '10016' in Source 'DCOM' cannot be found. The local computer may not have the necessary registry information or message DLL files to display the message, or you may not have permission to access them. The following information is part of the event:'application-specific', 'Local', 'Activation', '{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}', '{F72671A9-012C-4725-9D2F-2A4D32D65169}', 'NT AUTHORITY', 'SYSTEM', 'S-1-5-18', 'LocalHost (Using LRPC)', 'Unavailable', 'Unavailable'
26.03.201723.00.13ProcessStartedC:\Windows\System32\RuntimeBroker.exe
26.03.201723.00.13ProcessStartedC:\Windows\Explorer.EXE
26.03.201723.00.14ProcessStartedC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: bjarne Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: DefaultAccount Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Administrator Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: klara Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: defaultuser0 Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Guest Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: DefaultAccount Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: defaultuser0 Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Administrator Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: bjarne Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: klara Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: os Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Guest Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Administrator Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: bjarne Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: DefaultAccount Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: DefaultAccount Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: defaultuser0 Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: klara Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: os Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: defaultuser0 Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Guest Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: bjarne Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: DefaultAccount Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: defaultuser0 Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: os Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Administrator Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Administrator Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: Guest Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: os Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: bjarne Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: klara Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.22EventSecurityAn attempt was made to query the existence of a blank password for an account. Subject: Security ID: S-1-5-19 Account Name: LOCAL SERVICE Account Domain: NT AUTHORITY Logon ID: 0x3e5 Additional Information: Caller Workstation: DESKTOP-KV0DOUH Target Account Name: haugerud Target Account Domain: DESKTOP-KV0DOUH
26.03.201723.00.31ProcessStartedC:\Program Files\Windows Defender\MSASCuiL.exe
26.03.201723.00.32ProcessStartedC:\Users\haugerud\AppData\Local\Microsoft\OneDrive\OneDrive.exe
26.03.201723.01.14ProcessStartedC:\Windows\system32\DllHost.exe
26.03.201723.01.16EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe
26.03.201723.01.16EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-551 Group Name: Backup Operators Group Domain: Builtin Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe
26.03.201723.01.18ProcessStartedC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
26.03.201723.01.26ProcessStartedC:\Windows\system32\conhost.exe
26.03.201723.01.27EventWindows PowerShellEngine state is changed from None to Available. Details: NewEngineState=Available PreviousEngineState=None SequenceNumber=13 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.14393.953 RunspaceId=6183cbc0-4ffd-4234-ae8f-cabf7b6cbcf9 PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "Function" is Started. Details: ProviderName=Function NewProviderState=Started SequenceNumber=9 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "Registry" is Started. Details: ProviderName=Registry NewProviderState=Started SequenceNumber=1 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "Variable" is Started. Details: ProviderName=Variable NewProviderState=Started SequenceNumber=11 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "Environment" is Started. Details: ProviderName=Environment NewProviderState=Started SequenceNumber=5 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "Alias" is Started. Details: ProviderName=Alias NewProviderState=Started SequenceNumber=3 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.01.27EventWindows PowerShellProvider "FileSystem" is Started. Details: ProviderName=FileSystem NewProviderState=Started SequenceNumber=7 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=7cecefce-006a-4156-bf54-5799fba5f17c HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
26.03.201723.02.15ProcessStartedC:\Program Files\WindowsApps\Microsoft.SkypeApp_11.12.112.0_x64__kzf8qxf38zg5c\SkypeHost.exe
26.03.201723.02.23ProcessStartedC:\Windows\System32\InstallAgent.exe
26.03.201723.02.23ProcessStartedC:\Windows\System32\InstallAgentUserBroker.exe
26.03.201723.02.39File/DirCreatedC:\Users\haugerud\Documents\4
26.03.201723.02.40EventSystemWindows Update started downloading an update.
26.03.201723.02.52File/DirCreatedC:\Users\haugerud\Documents\4\param.ps1
26.03.201723.02.55EventApplicationFault bucket , type 0 Event Name: StoreAgentDownloadFailure1 Response: Not available Cab Id: 0 Problem signature: P1: Update;taskhostw P2: 80070020 P3: 14393 P4: 953 P5: Windows.Desktop P6: 9 P7: P8: P9: P10: Attached files: These files may be available here: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_Update;taskhostw_88588915b0dcf328cb176429bd732564b965684_00000000_12e47681 Analysis symbol: Rechecking for solution: 0 Report Id: 940c6523-1267-11e7-a050-0800278667e5 Report Status: 4 Hashed bucket:
26.03.201723.03.03EventApplicationFault bucket 127819474838, type 5 Event Name: StoreAgentDownloadFailure1 Response: Not available Cab Id: 0 Problem signature: P1: Update;taskhostw P2: 80070020 P3: 14393 P4: 953 P5: Windows.Desktop P6: 9 P7: P8: P9: P10: Attached files: These files may be available here: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_Update;taskhostw_88588915b0dcf328cb176429bd732564b965684_00000000_0f5496e9 Analysis symbol: Rechecking for solution: 0 Report Id: 940c6523-1267-11e7-a050-0800278667e5 Report Status: 0 Hashed bucket: 174bf8755169f75079045ae98076d0e5
26.03.201723.03.17File/DirCreatedC:\Users\haugerud\Documents\4\ev.ps1
26.03.201723.03.42File/DirCreatedC:\Users\haugerud\Documents\4\fileEvents.ps1
26.03.201723.03.51ProcessStartedC:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
26.03.201723.03.52File/DirCreatedC:\Users\haugerud\Documents\4\readDate.ps1
26.03.201723.04.04EventSystemThe description for Event ID '16' in Source 'Microsoft-Windows-Kernel-General' cannot be found. The local computer may not have the necessary registry information or message DLL files to display the message, or you may not have permission to access them. The following information is part of the event:'150', '\??\C:\ProgramData\Microsoft\Windows\AppRepository\Packages\microsoft.windowscommunicationsapps_17.8021.42017.0_x64__8wekyb3d8bbwe\ActivationStore.dat', '0', '0'
26.03.201723.04.07EventSystemThe description for Event ID '16' in Source 'Microsoft-Windows-Kernel-General' cannot be found. The local computer may not have the necessary registry information or message DLL files to display the message, or you may not have permission to access them. The following information is part of the event:'116', '\??\C:\Users\haugerud\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\Settings\settings.dat', '37', '2'
26.03.201723.04.11EventSystemInstallation Started: Windows has started installing the following update: Mail and Calendar
26.03.201723.04.11File/DirCreatedC:\Users\haugerud\Documents\4\ie.ps1
26.03.201723.04.16EventSystemInstallation Successful: Windows successfully installed the following update: Mail and Calendar
26.03.201723.04.20ProcessStartedC:\Program Files\Windows Defender\MpCmdRun.exe
26.03.201723.05.28File/DirCreatedC:\Users\haugerud\Documents\4\getCom.ps1
26.03.201723.06.22ProcessStartedC:\Program Files (x86)\Microsoft VS Code\Code.exe
26.03.201723.07.38ProcessStartedC:\Program Files (x86)\Microsoft VS Code\Code.exe
26.03.201723.07.44ProcessStartedC:\Program Files (x86)\Microsoft VS Code\Code.exe
26.03.201723.07.53ProcessStartedC:\Program Files (x86)\Microsoft VS Code\Code.exe
26.03.201723.07.54ProcessStartedC:\Program Files (x86)\Microsoft VS Code\Code.exe
26.03.201723.15.14EventSystemGeolocation positioning has been disabled by the user.
26.03.201723.59.58EventSystemThe description for Event ID '16' in Source 'Microsoft-Windows-Kernel-General' cannot be found. The local computer may not have the necessary registry information or message DLL files to display the message, or you may not have permission to access them. The following information is part of the event:'103', '\??\C:\Users\haugerud\AppData\Local\Packages\Microsoft.WindowsStore_8wekyb3d8bbwe\Settings\settings.dat', '13', '1'
27.03.201700.00.53EventSecurityA user's local group membership was enumerated. Subject: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x57901 User: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Process Information: Process ID: 0x132c Process Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
27.03.201700.31.25EventSecurityA user's local group membership was enumerated. Subject: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Logon ID: 0x57901 User: Security ID: S-1-5-21-861375751-3771627180-3643734012-1003 Account Name: haugerud Account Domain: DESKTOP-KV0DOUH Process Information: Process ID: 0xee0 Process Name: C:\Program Files\Git\usr\bin\scp.exe
27.03.201700.31.29File/DirCreatedC:\Users\haugerud\Documents\photo.ps1
27.03.201700.33.36EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x954 Process Name: C:\Windows\System32\consent.exe
27.03.201700.33.36EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x954 Process Name: C:\Windows\System32\consent.exe
27.03.201700.33.42EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1843 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-861375751-3771627180-3643734012-1005 Account Name: bjarne Account Domain: DESKTOP-KV0DOUH Logon ID: 0x188a10 Linked Logon ID: 0x1889f0 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x954 Process Name: C:\Windows\System32\consent.exe Network Information: Workstation Name: DESKTOP-KV0DOUH Source Network Address: ::1 Source Port: 0 Detailed Authentication Information: Logon Process: CredPro Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
27.03.201700.33.42EventSecuritySpecial privileges assigned to new logon. Subject: Security ID: S-1-5-21-861375751-3771627180-3643734012-1005 Account Name: bjarne Account Domain: DESKTOP-KV0DOUH Logon ID: 0x1889f0 Privileges: SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege SeRestorePrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeImpersonatePrivilege SeDelegateSessionUserImpersonatePrivilege
27.03.201700.33.42EventSecurityAn account was successfully logged on. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon Information: Logon Type: 2 Restricted Admin Mode: - Virtual Account: %%1843 Elevated Token: %%1842 Impersonation Level: %%1833 New Logon: Security ID: S-1-5-21-861375751-3771627180-3643734012-1005 Account Name: bjarne Account Domain: DESKTOP-KV0DOUH Logon ID: 0x1889f0 Linked Logon ID: 0x188a10 Network Account Name: - Network Account Domain: - Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x954 Process Name: C:\Windows\System32\consent.exe Network Information: Workstation Name: DESKTOP-KV0DOUH Source Network Address: ::1 Source Port: 0 Detailed Authentication Information: Logon Process: CredPro Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The impersonation level field indicates the extent to which a process in the logon session can impersonate. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
27.03.201700.33.42EventSecurityAn account was logged off. Subject: Security ID: S-1-5-21-861375751-3771627180-3643734012-1005 Account Name: bjarne Account Domain: DESKTOP-KV0DOUH Logon ID: 0x188a10 Logon Type: 2 This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
27.03.201700.33.42EventSecurityA logon was attempted using explicit credentials. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon GUID: {00000000-0000-0000-0000-000000000000} Account Whose Credentials Were Used: Account Name: bjarne Account Domain: DESKTOP-KV0DOUH Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: localhost Additional Information: localhost Process Information: Process ID: 0x954 Process Name: C:\Windows\System32\consent.exe Network Information: Network Address: ::1 Port: 0 This event is generated when a process attempts to log on an account by explicitly specifying that account?s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
27.03.201700.33.44EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe
27.03.201700.33.44EventSecurityA security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-KV0DOUH$ Account Domain: WORKGROUP Logon ID: 0x3e7 Group: Security ID: S-1-5-32-544 Group Name: Administrators Group Domain: Builtin Process Information: Process ID: 0x334 Process Name: C:\Windows\System32\svchost.exe
27.03.201700.33.44ProcessStartedC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
27.03.201700.33.44ProcessStartedC:\Windows\system32\conhost.exe
27.03.201700.33.45EventWindows PowerShellProvider "Alias" is Started. Details: ProviderName=Alias NewProviderState=Started SequenceNumber=3 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellProvider "Registry" is Started. Details: ProviderName=Registry NewProviderState=Started SequenceNumber=1 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellProvider "Function" is Started. Details: ProviderName=Function NewProviderState=Started SequenceNumber=9 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellProvider "FileSystem" is Started. Details: ProviderName=FileSystem NewProviderState=Started SequenceNumber=7 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellProvider "Environment" is Started. Details: ProviderName=Environment NewProviderState=Started SequenceNumber=5 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellProvider "Variable" is Started. Details: ProviderName=Variable NewProviderState=Started SequenceNumber=11 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion= RunspaceId= PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=
27.03.201700.33.45EventWindows PowerShellEngine state is changed from None to Available. Details: NewEngineState=Available PreviousEngineState=None SequenceNumber=13 HostName=ConsoleHost HostVersion=5.1.14393.953 HostId=096d9e99-32a3-4e97-a31e-4947d3bdc6ea HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe EngineVersion=5.1.14393.953 RunspaceId=c09153e3-7e3f-495e-affd-485ce9d8c9d5 PipelineId= CommandName= CommandType= ScriptName= CommandPath= CommandLine=