Microsoft-Windows-Security-Mitigations
36 events across 2 channels
| Event ID | Title | Channel |
|---|---|---|
| 1 | Process '. | KernelMode |
| 2 | Process '. | KernelMode |
| 3 | Process '. | KernelMode |
| 4 | Process '. | KernelMode |
| 5 | Process '. | KernelMode |
| 6 | Process '. | KernelMode |
| 7 | Process '. | KernelMode |
| 8 | Process '. | KernelMode |
| 9 | Process '. | KernelMode |
| 10 | Process '. | KernelMode |
| 11 | Process '. | KernelMode |
| 12 | Process '. | KernelMode |
| 13 | Process '. | UserMode |
| 14 | Process '. | UserMode |
| 15 | Process '. | UserMode |
| 16 | Process '. | UserMode |
| 17 | Process '. | UserMode |
| 18 | Process '. | UserMode |
| 19 | Process '. | UserMode |
| 20 | Process '. | UserMode |
| 21 | Process '. | UserMode |
| 22 | Process '. | UserMode |
| 23 | Process '. | UserMode |
| 24 | Process '. | UserMode |
| 25 | Process '. | KernelMode |
| 26 | Process '. | KernelMode |
| 27 | Process '. | KernelMode |
| 28 | Process '. | KernelMode |
| 29 | Process '. | KernelMode |
| 30 | Process '. | KernelMode |
| 31 | Process '. | KernelMode |
| 32 | Process '. | KernelMode |
| 33 | The system has encountered a kernel-mode shadow stack return address mismatch. | KernelMode |
| 34 | The system has encountered a kernel-mode shadow stack return address mismatch. | KernelMode |
| 35 | Process '. | KernelMode |
| 36 | Process '. | KernelMode |
Event ID 1 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Example Event
system:
provider: Microsoft-Windows-Security-Mitigations
guid: FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF
event_source_name: ''
event_id: 1
version: 0
level: 0
task: 1
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-04T14:07:23.788203+00:00'
event_record_id: 7
correlation: {}
execution:
process_id: 4808
thread_id: 4432
channel: Microsoft-Windows-Security-Mitigations/KernelMode
computer: WIN-TKC15D7KHUR
security:
user_id: S-1-5-21-1958040314-2592322477-2606035944-500
event_data:
ProcessPathLength: 60
ProcessPath: \Device\HarddiskVolume2\Windows\System32\inetsrv\InetMgr.exe
ProcessCommandLineLength: 42
ProcessCommandLine: '"C:\Windows\system32\inetsrv\InetMgr.exe" '
CallingProcessId: 4808
CallingProcessCreateTime: '2022-04-04T14:07:23.009253Z'
CallingProcessStartKey: 1407374883554550
CallingProcessSignatureLevel: 0
CallingProcessSectionSignatureLevel: 0
CallingProcessProtection: 0
CallingThreadId: 4432
CallingThreadCreateTime: '2022-04-04T14:07:23.009255Z'
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Example Event
system:
provider: Microsoft-Windows-Security-Mitigations
guid: FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF
event_source_name: ''
event_id: 2
version: 0
level: 3
task: 1
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T01:01:34.932541+00:00'
event_record_id: 88
correlation: {}
execution:
process_id: 11664
thread_id: 10404
channel: Microsoft-Windows-Security-Mitigations/KernelMode
computer: WinDev2310Eval
security:
user_id: S-1-5-21-1992711665-1655669231-58201500-1000
event_data:
ProcessPathLength: 59
ProcessPath: \Device\HarddiskVolume4\Program Files\TeamViewer\tv_x64.exe
ProcessCommandLineLength: 192
ProcessCommandLine: '"C:\Program Files\TeamViewer\tv_x64.exe" --action installpnpdriver
--inf "C:\Program Files\TeamViewer\x64\TVVirtualMonitorDriver.inf" --log "C:\Program
Files\TeamViewer\TeamViewer15_Hooks.log"'
CallingProcessId: 11664
CallingProcessCreateTime: '2023-11-06T01:01:34.836839Z'
CallingProcessStartKey: 3659174697240700
CallingProcessSignatureLevel: 2
CallingProcessSectionSignatureLevel: 2
CallingProcessProtection: 0
CallingThreadId: 10404
CallingThreadCreateTime: '2023-11-06T01:01:34.836843Z'
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 3 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
ChildImagePathNameLength | — |
ChildImagePathName | — |
ChildCommandLineLength | — |
ChildCommandLine | — |
Example Event
system:
provider: Microsoft-Windows-Security-Mitigations
guid: FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF
event_source_name: ''
event_id: 3
version: 0
level: 0
task: 2
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-26T04:19:22.802481+00:00'
event_record_id: 6
correlation: {}
execution:
process_id: 2524
thread_id: 452
channel: Microsoft-Windows-Security-Mitigations/KernelMode
computer: WIN-OQ6R0RVA4NF
security:
user_id: S-1-5-18
event_data:
ProcessPathLength: 52
ProcessPath: \Device\HarddiskVolume4\Windows\System32\spoolsv.exe
ProcessCommandLineLength: 31
ProcessCommandLine: C:\Windows\System32\spoolsv.exe
CallingProcessId: 2524
CallingProcessCreateTime: '2023-10-26T04:17:19.791140Z'
CallingProcessStartKey: 281474976710715
CallingProcessSignatureLevel: 2
CallingProcessSectionSignatureLevel: 2
CallingProcessProtection: 0
CallingThreadId: 452
CallingThreadCreateTime: '2023-10-26T04:19:20.206505Z'
ChildImagePathNameLength: 32
ChildImagePathName: C:\Windows\SysWOW64\regsvr32.exe
ChildCommandLineLength: 73
ChildCommandLine: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\PrintConfig.dll"
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 4 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
ChildImagePathNameLength | — |
ChildImagePathName | — |
ChildCommandLineLength | — |
ChildCommandLine | — |
Event ID 5 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetThreadId | — |
TargetThreadCreateTime | — |
ImageNameLength | — |
ImageName | — |
Event ID 6 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetThreadId | — |
TargetThreadCreateTime | — |
ImageNameLength | — |
ImageName | — |
Event ID 7 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Event ID 8 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Event ID 9 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Event ID 10 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Example Event
system:
provider: Microsoft-Windows-Security-Mitigations
guid: FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF
event_source_name: ''
event_id: 10
version: 0
level: 3
task: 5
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T01:55:30.233087+00:00'
event_record_id: 194
correlation: {}
execution:
process_id: 17736
thread_id: 9464
channel: Microsoft-Windows-Security-Mitigations/KernelMode
computer: WinDev2310Eval
security:
user_id: S-1-5-21-1992711665-1655669231-58201500-1000
event_data:
ProcessPathLength: 65
ProcessPath: \Device\HarddiskVolume4\Program Files\Mozilla Firefox\firefox.exe
ProcessCommandLineLength: 412
ProcessCommandLine: '"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc
--channel=7928 -childID 13 -isForBrowser -prefsHandle 7924 -prefMapHandle 7272
-prefsLen 37923 -prefMapSize 235045 -jsInitHandle 1588 -jsInitLen 235336 -parentBuildID
20231019122658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {9095c7bc-c09b-4e88-a55a-1b4a7ff727a7} 4148 "\\.\pipe\gecko-crash-server-pipe.4148"
22025387bd0 tab'
CallingProcessId: 17736
CallingProcessCreateTime: '2023-11-06T01:55:29.635202Z'
CallingProcessStartKey: 3659174697241340
CallingProcessSignatureLevel: 2
CallingProcessSectionSignatureLevel: 2
CallingProcessProtection: 0
CallingThreadId: 9464
CallingThreadCreateTime: '2023-11-06T01:55:29.635208Z'
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 11 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetThreadId | — |
TargetThreadCreateTime | — |
RequiredSignatureLevel | — |
SignatureLevel | — |
ImageNameLength | — |
ImageName | — |
Sigma Rules
- Microsoft Defender Blocked from Loading Unsigned DLL
Detects Code Integrity (CI) engine blocking Microsoft Defender's processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL - Unsigned Binary Loaded From Suspicious Location
Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
Event ID 12 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetThreadId | — |
TargetThreadCreateTime | — |
RequiredSignatureLevel | — |
SignatureLevel | — |
ImageNameLength | — |
ImageName | — |
Example Event
system:
provider: Microsoft-Windows-Security-Mitigations
guid: FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF
event_source_name: ''
event_id: 12
version: 0
level: 3
task: 6
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T01:51:38.699135+00:00'
event_record_id: 190
correlation: {}
execution:
process_id: 18848
thread_id: 20656
channel: Microsoft-Windows-Security-Mitigations/KernelMode
computer: WinDev2310Eval
security:
user_id: S-1-5-21-1992711665-1655669231-58201500-1000
event_data:
ProcessPathLength: 74
ProcessPath: \Device\HarddiskVolume4\Program Files\Google\Chrome\Application\chrome.exe
ProcessCommandLineLength: 475
ProcessCommandLine: '"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer
--disable-nacl --origin-trial-disabled-features=WebGPU --disable-gpu-compositing
--lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation
--renderer-client-id=52 --time-ticks-at-unix-epoch=-1699223515372207 --launch-time-ticks=11971985687
--mojo-platform-channel-handle=7792 --field-trial-handle=1832,i,15435703333515679192,1539963582152160407,262144
/prefetch:1'
ProcessId: 18848
ProcessCreateTime: '2023-11-06T01:51:27.394536Z'
ProcessStartKey: 3659174697241317
ProcessSignatureLevel: 8
ProcessSectionSignatureLevel: 8
ProcessProtection: 0
TargetThreadId: 20656
TargetThreadCreateTime: '2023-11-06T01:51:27.394551Z'
RequiredSignatureLevel: 8
SignatureLevel: 4
ImageNameLength: 51
ImageName: \Program Files\Malwarebytes\Anti-Malware\mbae64.dll
message: ''
Sigma Rules
- Microsoft Defender Blocked from Loading Unsigned DLL
Detects Code Integrity (CI) engine blocking Microsoft Defender's processes (MpCmdRun and NisSrv) from loading unsigned DLLs which may be an attempt to sideload arbitrary DLL - Unsigned Binary Loaded From Suspicious Location
Detects Code Integrity (CI) engine blocking processes from loading unsigned DLLs residing in suspicious locations
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 13 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 14 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 15 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 16 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 17 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 18 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
ModuleFullPath | — |
ModuleBase | — |
ModuleAddress | — |
MemAddress | — |
MemModuleFullPath | — |
MemModuleBase | — |
APIName | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 19 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 20 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 21 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 22 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
Event ID 23 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 24 — Process '.
Message
Fields
| Name | Description |
|---|---|
Subcode | — |
ProcessPath | — |
ProcessId | — |
HookedAPI | — |
ReturnAddress | — |
CalledAddress | — |
TargetAddress | — |
StackAddress | — |
FrameAddress | — |
ReturnAddressModuleFullPath | — |
ProcessStartTime | — |
ThreadId | — |
References
Event ID 25 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
ControlPcImageNameLength | — |
ControlPcImageName | — |
RspContentsImageNameLength | — |
RspContentsImageName | — |
StrictMode | — |
UserCetAppcompatOptions | — |
NonenforcementReason | — |
ControlPcAddress | — |
ControlPcOffset | — |
ControlPcCetCompat | — |
RspContentsAddress | — |
RspContentsOffset | — |
RspContentsCetCompat | — |
References
Event ID 26 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
ControlPcImageNameLength | — |
ControlPcImageName | — |
RspContentsImageNameLength | — |
RspContentsImageName | — |
StrictMode | — |
UserCetAppcompatOptions | — |
NonenforcementReason | — |
ControlPcAddress | — |
ControlPcOffset | — |
ControlPcCetCompat | — |
RspContentsAddress | — |
RspContentsOffset | — |
RspContentsCetCompat | — |
Event ID 27 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetIpImageNameLength | — |
TargetIpImageName | — |
StrictMode | — |
ContinueType | — |
References
Event ID 28 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
TargetIpImageNameLength | — |
TargetIpImageName | — |
StrictMode | — |
ContinueType | — |
References
Event ID 29 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
MappedImageNameLength | — |
MappedImageName | — |
ImageCetShadowStacksReady | — |
ImageEHContinuationTablePresent | — |
NonEhcontMode | — |
References
Event ID 30 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
MappedImageNameLength | — |
MappedImageName | — |
ImageCetShadowStacksReady | — |
ImageEHContinuationTablePresent | — |
NonEhcontMode | — |
Event ID 31 — Process '.
Message
Fields
| Name | Description |
|---|---|
Binary_path | — |
Arguments | — |
Redirection_Type | — |
Operation_Path | Arguments. |
Impersonating | — |
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
RedirectionType | — |
OperationPathLength | — |
OperationPath | — |
Module1 | — |
Module1Offset | — |
Module2 | — |
Module2Offset | — |
Module3 | — |
Module3Offset | — |
Module4 | — |
Module4Offset | — |
Module5 | — |
Module5Offset | — |
Module6 | — |
Module6Offset | — |
Module7 | — |
Module7Offset | — |
Module8 | — |
Module8Offset | — |
Module9 | — |
Module9Offset | — |
Module10 | — |
Module10Offset | — |
Module11 | — |
Module11Offset | — |
Module12 | — |
Module12Offset | — |
Module13 | — |
Module13Offset | — |
Module14 | — |
Module14Offset | — |
Module15 | — |
Module15Offset | — |
Module16 | — |
Module16Offset | — |
Event ID 32 — Process '.
Message
Fields
| Name | Description |
|---|---|
Binary_path | — |
Arguments | — |
Redirection_Type | — |
Operation_Path | Arguments. |
Impersonating | — |
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
ProcessId | — |
ProcessCreateTime | — |
ProcessStartKey | — |
ProcessSignatureLevel | — |
ProcessSectionSignatureLevel | — |
ProcessProtection | — |
RedirectionType | — |
OperationPathLength | — |
OperationPath | — |
Module1 | — |
Module1Offset | — |
Module2 | — |
Module2Offset | — |
Module3 | — |
Module3Offset | — |
Module4 | — |
Module4Offset | — |
Module5 | — |
Module5Offset | — |
Module6 | — |
Module6Offset | — |
Module7 | — |
Module7Offset | — |
Module8 | — |
Module8Offset | — |
Module9 | — |
Module9Offset | — |
Module10 | — |
Module10Offset | — |
Module11 | — |
Module11Offset | — |
Module12 | — |
Module12Offset | — |
Module13 | — |
Module13Offset | — |
Module14 | — |
Module14Offset | — |
Module15 | — |
Module15Offset | — |
Module16 | — |
Module16Offset | — |
Event ID 33 — The system has encountered a kernel-mode shadow stack return address mismatch.
Message
Fields
| Name | Description |
|---|---|
ControlPcImageNameLength | — |
ControlPcImageName | — |
RspContentsImageNameLength | — |
RspContentsImageName | — |
NonenforcementReason | — |
ControlPcAddress | — |
ControlPcOffset | — |
ControlPcCetCompat | — |
RspContentsAddress | — |
RspContentsOffset | — |
RspContentsCetCompat | — |
ShadowStackOverflowReset | — |
ErrorCode | — |
Event ID 34 — The system has encountered a kernel-mode shadow stack return address mismatch.
Message
Fields
| Name | Description |
|---|---|
Instruction_address | — |
module_offset | — |
Instruction_address | — |
module_offset | — |
ControlPcImageNameLength | — |
ControlPcImageName | — |
RspContentsImageNameLength | — |
RspContentsImageName | — |
NonenforcementReason | — |
ControlPcAddress | — |
ControlPcOffset | — |
ControlPcCetCompat | — |
RspContentsAddress | — |
RspContentsOffset | — |
RspContentsCetCompat | — |
ShadowStackOverflowReset | — |
ErrorCode | — |
Event ID 35 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |
Event ID 36 — Process '.
Message
Fields
| Name | Description |
|---|---|
ProcessPathLength | — |
ProcessPath | — |
ProcessCommandLineLength | — |
ProcessCommandLine | — |
CallingProcessId | — |
CallingProcessCreateTime | — |
CallingProcessStartKey | — |
CallingProcessSignatureLevel | — |
CallingProcessSectionSignatureLevel | — |
CallingProcessProtection | — |
CallingThreadId | — |
CallingThreadCreateTime | — |