Microsoft-Windows-Security-Mitigations
36 events across 2 channels
Event ID 1 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from generating dynamic code.
#Description
Process 'ProcessPath' (PID CallingProcessId) would have been blocked from generating dynamic code.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 1,
"version": 0,
"level": 0,
"task": 1,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2022-04-04T14:07:23.788203+00:00",
"event_record_id": 7,
"correlation": {},
"execution": {
"process_id": 4808,
"thread_id": 4432
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "WIN-TKC15D7KHUR",
"security": {
"user_id": "S-1-5-21-1958040314-2592322477-2606035944-500"
}
},
"event_data": {
"ProcessPathLength": 60,
"ProcessPath": "\\Device\\HarddiskVolume2\\Windows\\System32\\inetsrv\\InetMgr.exe",
"ProcessCommandLineLength": 42,
"ProcessCommandLine": "\"C:\\Windows\\system32\\inetsrv\\InetMgr.exe\" ",
"CallingProcessId": 4808,
"CallingProcessCreateTime": "2022-04-04T14:07:23.009253Z",
"CallingProcessStartKey": 1407374883554550,
"CallingProcessSignatureLevel": 0,
"CallingProcessSectionSignatureLevel": 0,
"CallingProcessProtection": 0,
"CallingThreadId": 4432,
"CallingThreadCreateTime": "2022-04-04T14:07:23.009255Z"
},
"message": ""
}
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2 — Process 'ProcessPath' (PID CallingProcessId) was blocked from generating dynamic code.
#Description
Process 'ProcessPath' (PID CallingProcessId) was blocked from generating dynamic code.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 2,
"version": 0,
"level": 3,
"task": 1,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2023-11-06T01:01:34.932541+00:00",
"event_record_id": 88,
"correlation": {},
"execution": {
"process_id": 11664,
"thread_id": 10404
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "WinDev2310Eval",
"security": {
"user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
}
},
"event_data": {
"ProcessPathLength": 59,
"ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\TeamViewer\\tv_x64.exe",
"ProcessCommandLineLength": 192,
"ProcessCommandLine": "\"C:\\Program Files\\TeamViewer\\tv_x64.exe\" --action installpnpdriver --inf \"C:\\Program Files\\TeamViewer\\x64\\TVVirtualMonitorDriver.inf\" --log \"C:\\Program Files\\TeamViewer\\TeamViewer15_Hooks.log\"",
"CallingProcessId": 11664,
"CallingProcessCreateTime": "2023-11-06T01:01:34.836839Z",
"CallingProcessStartKey": 3659174697240700,
"CallingProcessSignatureLevel": 2,
"CallingProcessSectionSignatureLevel": 2,
"CallingProcessProtection": 0,
"CallingThreadId": 10404,
"CallingThreadCreateTime": "2023-11-06T01:01:34.836843Z"
},
"message": ""
}
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 3 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.
#Description
Process 'ProcessPath' (PID CallingProcessId) would have been blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
ChildImagePathNameLength UInt16 | — |
ChildImagePathName UnicodeString | — |
ChildCommandLineLength UInt16 | — |
ChildCommandLine UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 3,
"version": 0,
"level": 0,
"task": 2,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2023-10-26T04:19:22.802481+00:00",
"event_record_id": 6,
"correlation": {},
"execution": {
"process_id": 2524,
"thread_id": 452
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "WIN-OQ6R0RVA4NF",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"ProcessPathLength": 52,
"ProcessPath": "\\Device\\HarddiskVolume4\\Windows\\System32\\spoolsv.exe",
"ProcessCommandLineLength": 31,
"ProcessCommandLine": "C:\\Windows\\System32\\spoolsv.exe",
"CallingProcessId": 2524,
"CallingProcessCreateTime": "2023-10-26T04:17:19.791140Z",
"CallingProcessStartKey": 281474976710715,
"CallingProcessSignatureLevel": 2,
"CallingProcessSectionSignatureLevel": 2,
"CallingProcessProtection": 0,
"CallingThreadId": 452,
"CallingThreadCreateTime": "2023-10-26T04:19:20.206505Z",
"ChildImagePathNameLength": 32,
"ChildImagePathName": "C:\\Windows\\SysWOW64\\regsvr32.exe",
"ChildCommandLineLength": 73,
"ChildCommandLine": "C:\\Windows\\SysWOW64\\regsvr32.exe /s \"C:\\Windows\\SysWOW64\\PrintConfig.dll\""
},
"message": ""
}
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 4 — Process 'ProcessPath' (PID CallingProcessId) was blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.
Description
Process 'ProcessPath' (PID CallingProcessId) was blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
ChildImagePathNameLength UInt16 | — |
ChildImagePathName UnicodeString | — |
ChildCommandLineLength UInt16 | — |
ChildCommandLine UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 4,
"version": 0,
"level": 3,
"task": 2,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2026-03-11T06:27:47.998503+00:00",
"event_record_id": 3000,
"correlation": {},
"execution": {
"process_id": 6084,
"thread_id": 6236
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "LAB-WIN11",
"security": {
"user_id": "S-1-5-19"
}
},
"event_data": {
"ProcessPathLength": 94,
"ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Windows Defender Advanced Threat Protection\\SenseNdr.exe",
"ProcessCommandLineLength": 512,
"ProcessCommandLine": "\"C:\\Program Files\\Windows Defender Advanced Threat Protection\\SenseNdr.exe\" \"eyJDbGllbnRWZXIiOiIxMC44MjEwLjIyNjIxLjQ1NyIsIkNvbXBvbmVudHMiOlt7IkFkYXB0ZXJJZCI6Ins4QTE3NjBCNi1EQzk5LTRCOTAtOUM0QS0wMjk2OThFNUFFMjd9IiwiQ2F0ZWdvcnkiOjIsIkRlZmF1bHRHYXRld2F5cyI6W3siQWRkcmVzcyI6IjEwLjIuMTAuMjU0IiwiTUFDIjoiYmM6MjQ6MTE6MjI6NWI6NTcifV0sIkRvbWFpblR5cGUiOjAsIklwQWRkcmVzc2VzIjpbeyJBZGRyZXNzIjoiMTAuMi4xMC4yMSIsIk1BU0siOjI0fV0sIk5ldE5hbWUiOiJOZXR3b3JrIDIiLCJQaHlzaWNhbEFkZHIiOiJiYzI0MTE5YTRkYzIiLCJQa3RNb25JZCI6MSwiUmVnaXN0cn",
"CallingProcessId": 6084,
"CallingProcessCreateTime": "2026-03-11T06:27:47.450908Z",
"CallingProcessStartKey": 4222124650660002,
"CallingProcessSignatureLevel": 8,
"CallingProcessSectionSignatureLevel": 8,
"CallingProcessProtection": 0,
"CallingThreadId": 6236,
"CallingThreadCreateTime": "2026-03-11T06:27:47.450927Z",
"ChildImagePathNameLength": 35,
"ChildImagePathName": "\\??\\C:\\Windows\\system32\\conhost.exe",
"ChildCommandLineLength": 55,
"ChildCommandLine": "\\??\\C:\\Windows\\system32\\conhost.exe 0xffffffff -ForceV1"
},
"message": ""
}
Event ID 5 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the low-integrity binary 'ImageName'.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the low-integrity binary 'ImageName'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetThreadId UInt32 | — |
TargetThreadCreateTime FILETIME | — |
ImageNameLength UInt16 | — |
ImageName UnicodeString | — |
Event ID 6 — Process 'ProcessPath' (PID ProcessId) was blocked from loading the low-integrity binary 'ImageName'.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from loading the low-integrity binary 'ImageName'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetThreadId UInt32 | — |
TargetThreadCreateTime FILETIME | — |
ImageNameLength UInt16 | — |
ImageName UnicodeString | — |
Event ID 7 — Process 'ProcessPath' (PID CallingProcessId) would have been blocking from loading a binary from a remote share.
Description
Process 'ProcessPath' (PID CallingProcessId) would have been blocking from loading a binary from a remote share.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Event ID 8 — Process 'ProcessPath' (PID CallingProcessId) was blocked from loading a binary from a remote share.
Description
Process 'ProcessPath' (PID CallingProcessId) was blocked from loading a binary from a remote share.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Event ID 9 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making system calls to Win32k.
Description
Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making system calls to Win32k.sys.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Event ID 10 — Process 'ProcessPath' (PID CallingProcessId) was blocked from making system calls to Win32k.
#Description
Process 'ProcessPath' (PID CallingProcessId) was blocked from making system calls to Win32k.sys.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 10,
"version": 0,
"level": 3,
"task": 5,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2023-11-06T01:55:30.233087+00:00",
"event_record_id": 194,
"correlation": {},
"execution": {
"process_id": 17736,
"thread_id": 9464
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "WinDev2310Eval",
"security": {
"user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
}
},
"event_data": {
"ProcessPathLength": 65,
"ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Mozilla Firefox\\firefox.exe",
"ProcessCommandLineLength": 412,
"ProcessCommandLine": "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -contentproc --channel=7928 -childID 13 -isForBrowser -prefsHandle 7924 -prefMapHandle 7272 -prefsLen 37923 -prefMapSize 235045 -jsInitHandle 1588 -jsInitLen 235336 -parentBuildID 20231019122658 -win32kLockedDown -appDir \"C:\\Program Files\\Mozilla Firefox\\browser\" - {9095c7bc-c09b-4e88-a55a-1b4a7ff727a7} 4148 \"\\\\.\\pipe\\gecko-crash-server-pipe.4148\" 22025387bd0 tab",
"CallingProcessId": 17736,
"CallingProcessCreateTime": "2023-11-06T01:55:29.635202Z",
"CallingProcessStartKey": 3659174697241340,
"CallingProcessSignatureLevel": 2,
"CallingProcessSectionSignatureLevel": 2,
"CallingProcessProtection": 0,
"CallingThreadId": 9464,
"CallingThreadCreateTime": "2023-11-06T01:55:29.635208Z"
},
"message": ""
}
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 11 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the non-Microsoft-signed binary 'ImageName'.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the non-Microsoft-signed binary 'ImageName'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetThreadId UInt32 | — |
TargetThreadCreateTime FILETIME | — |
RequiredSignatureLevel UInt8 | — |
SignatureLevel UInt8 | — |
ImageNameLength UInt16 | — |
ImageName UnicodeString | — |
Detection Patterns #
Event ID 12 — Process 'ProcessPath' (PID ProcessId) was blocked from loading the non-Microsoft-signed binary 'ImageName'.
#Description
Process 'ProcessPath' (PID ProcessId) was blocked from loading the non-Microsoft-signed binary 'ImageName'.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetThreadId UInt32 | — |
TargetThreadCreateTime FILETIME | — |
RequiredSignatureLevel UInt8 | — |
SignatureLevel UInt8 | — |
ImageNameLength UInt16 | — |
ImageName UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Mitigations",
"guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
"event_source_name": "",
"event_id": 12,
"version": 0,
"level": 3,
"task": 6,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2023-11-06T01:51:38.699135+00:00",
"event_record_id": 190,
"correlation": {},
"execution": {
"process_id": 18848,
"thread_id": 20656
},
"channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
"computer": "WinDev2310Eval",
"security": {
"user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
}
},
"event_data": {
"ProcessPathLength": 74,
"ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"ProcessCommandLineLength": 475,
"ProcessCommandLine": "\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=renderer --disable-nacl --origin-trial-disabled-features=WebGPU --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=52 --time-ticks-at-unix-epoch=-1699223515372207 --launch-time-ticks=11971985687 --mojo-platform-channel-handle=7792 --field-trial-handle=1832,i,15435703333515679192,1539963582152160407,262144 /prefetch:1",
"ProcessId": 18848,
"ProcessCreateTime": "2023-11-06T01:51:27.394536Z",
"ProcessStartKey": 3659174697241317,
"ProcessSignatureLevel": 8,
"ProcessSectionSignatureLevel": 8,
"ProcessProtection": 0,
"TargetThreadId": 20656,
"TargetThreadCreateTime": "2023-11-06T01:51:27.394551Z",
"RequiredSignatureLevel": 8,
"SignatureLevel": 4,
"ImageNameLength": 51,
"ImageName": "\\Program Files\\Malwarebytes\\Anti-Malware\\mbae64.dll"
},
"message": ""
}
Detection Patterns #
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 13 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 14 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 15 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 16 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 17 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Import Address Table for API 'APIName'.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Import Address Table for API 'APIName'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 18 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Import Address Table for API 'APIName'.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Import Address Table for API 'APIName'.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
ModuleFullPath UnicodeString | — |
ModuleBase Pointer | — |
ModuleAddress Pointer | — |
MemAddress Pointer | — |
MemModuleFullPath UnicodeString | — |
MemModuleBase Pointer | — |
APIName UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 19 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 20 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 21 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 22 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
Event ID 23 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 24 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.
Message #
Fields #
| Name | Description |
|---|---|
Subcode UInt32 | — |
ProcessPath UnicodeString | — |
ProcessId UInt32 | — |
HookedAPI UnicodeString | — |
ReturnAddress Pointer | — |
CalledAddress Pointer | — |
TargetAddress Pointer | — |
StackAddress Pointer | — |
FrameAddress Pointer | — |
ReturnAddressModuleFullPath UnicodeString | — |
ProcessStartTime FILETIME | — |
ThreadId UInt32 | — |
References #
Event ID 25 — Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch.
Description
Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch. The process will be allowed to continue execution.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
ControlPcImageNameLength UInt16 | — |
ControlPcImageName UnicodeString | — |
RspContentsImageNameLength UInt16 | — |
RspContentsImageName UnicodeString | — |
StrictMode Boolean | — |
UserCetAppcompatOptions UInt32 | — |
NonenforcementReason UInt32 | — |
ControlPcAddress Pointer | — |
ControlPcOffset Pointer | — |
ControlPcCetCompat Boolean | — |
RspContentsAddress Pointer | — |
RspContentsOffset Pointer | — |
RspContentsCetCompat Boolean | — |
References #
Event ID 26 — Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch.
Description
Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch. The process will be terminated.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
ControlPcImageNameLength UInt16 | — |
ControlPcImageName UnicodeString | — |
RspContentsImageNameLength UInt16 | — |
RspContentsImageName UnicodeString | — |
StrictMode Boolean | — |
UserCetAppcompatOptions UInt32 | — |
NonenforcementReason UInt32 | — |
ControlPcAddress Pointer | — |
ControlPcOffset Pointer | — |
ControlPcCetCompat Boolean | — |
RspContentsAddress Pointer | — |
RspContentsOffset Pointer | — |
RspContentsCetCompat Boolean | — |
Event ID 27 — Process 'ProcessPath' (PID ProcessId) would have been blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is ena...
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetIpImageNameLength UInt16 | — |
TargetIpImageName UnicodeString | — |
StrictMode Boolean | — |
ContinueType UInt32 | — |
References #
Event ID 28 — Process 'ProcessPath' (PID ProcessId) was blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.
Description
Process 'ProcessPath' (PID ProcessId) was blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
TargetIpImageNameLength UInt16 | — |
TargetIpImageName UnicodeString | — |
StrictMode Boolean | — |
ContinueType UInt32 | — |
References #
Event ID 29 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing...
Description
Process 'ProcessPath' (PID ProcessId) would have been blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
MappedImageNameLength UInt16 | — |
MappedImageName UnicodeString | — |
ImageCetShadowStacksReady Boolean | — |
ImageEHContinuationTablePresent Boolean | — |
NonEhcontMode Boolean | — |
References #
Event ID 30 — Process 'ProcessPath' (PID ProcessId) was blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception h...
Description
Process 'ProcessPath' (PID ProcessId) was blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
MappedImageNameLength UInt16 | — |
MappedImageName UnicodeString | — |
ImageCetShadowStacksReady Boolean | — |
ImageEHContinuationTablePresent Boolean | — |
NonEhcontMode Boolean | — |
Event ID 31 — Process 'Arguments' (PID Impersonating) would have been blocked from following an untrusted redirection.
Description
Process 'Arguments' (PID Impersonating) would have been blocked from following an untrusted redirection.
Message #
Fields #
| Name | Description |
|---|---|
Binary_path | — |
Arguments | — |
Redirection_Type | — |
Operation_Path | Arguments. |
Impersonating Boolean | — |
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
RedirectionType UInt32 | — |
OperationPathLength UInt16 | — |
OperationPath UnicodeString | — |
Module1 UnicodeString | — |
Module1Offset UInt64 | — |
Module2 UnicodeString | — |
Module2Offset UInt64 | — |
Module3 UnicodeString | — |
Module3Offset UInt64 | — |
Module4 UnicodeString | — |
Module4Offset UInt64 | — |
Module5 UnicodeString | — |
Module5Offset UInt64 | — |
Module6 UnicodeString | — |
Module6Offset UInt64 | — |
Module7 UnicodeString | — |
Module7Offset UInt64 | — |
Module8 UnicodeString | — |
Module8Offset UInt64 | — |
Module9 UnicodeString | — |
Module9Offset UInt64 | — |
Module10 UnicodeString | — |
Module10Offset UInt64 | — |
Module11 UnicodeString | — |
Module11Offset UInt64 | — |
Module12 UnicodeString | — |
Module12Offset UInt64 | — |
Module13 UnicodeString | — |
Module13Offset UInt64 | — |
Module14 UnicodeString | — |
Module14Offset UInt64 | — |
Module15 UnicodeString | — |
Module15Offset UInt64 | — |
Module16 UnicodeString | — |
Module16Offset UInt64 | — |
Event ID 32 — Process 'Arguments' (PID Impersonating) was blocked from following an untrusted redirection.
Description
Process 'Arguments' (PID Impersonating) was blocked from following an untrusted redirection.
Message #
Fields #
| Name | Description |
|---|---|
Binary_path | — |
Arguments | — |
Redirection_Type | — |
Operation_Path | Arguments. |
Impersonating Boolean | — |
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
ProcessId UInt32 | — |
ProcessCreateTime FILETIME | — |
ProcessStartKey UInt64 | — |
ProcessSignatureLevel UInt8 | — |
ProcessSectionSignatureLevel UInt8 | — |
ProcessProtection UInt8 | — |
RedirectionType UInt32 | — |
OperationPathLength UInt16 | — |
OperationPath UnicodeString | — |
Module1 UnicodeString | — |
Module1Offset UInt64 | — |
Module2 UnicodeString | — |
Module2Offset UInt64 | — |
Module3 UnicodeString | — |
Module3Offset UInt64 | — |
Module4 UnicodeString | — |
Module4Offset UInt64 | — |
Module5 UnicodeString | — |
Module5Offset UInt64 | — |
Module6 UnicodeString | — |
Module6Offset UInt64 | — |
Module7 UnicodeString | — |
Module7Offset UInt64 | — |
Module8 UnicodeString | — |
Module8Offset UInt64 | — |
Module9 UnicodeString | — |
Module9Offset UInt64 | — |
Module10 UnicodeString | — |
Module10Offset UInt64 | — |
Module11 UnicodeString | — |
Module11Offset UInt64 | — |
Module12 UnicodeString | — |
Module12Offset UInt64 | — |
Module13 UnicodeString | — |
Module13Offset UInt64 | — |
Module14 UnicodeString | — |
Module14Offset UInt64 | — |
Module15 UnicodeString | — |
Module15Offset UInt64 | — |
Module16 UnicodeString | — |
Module16Offset UInt64 | — |
Event ID 33 — The system has encountered a kernel-mode shadow stack return address mismatch.
Description
The system has encountered a kernel-mode shadow stack return address mismatch. The system will be allowed to continue execution because: NonenforcementReason.
Message #
Fields #
| Name | Description |
|---|---|
ControlPcImageNameLength UInt16 | — |
ControlPcImageName UnicodeString | — |
RspContentsImageNameLength UInt16 | — |
RspContentsImageName UnicodeString | — |
NonenforcementReason UInt32 | — |
ControlPcAddress Pointer | — |
ControlPcOffset Pointer | — |
ControlPcCetCompat Boolean | — |
RspContentsAddress Pointer | — |
RspContentsOffset Pointer | — |
RspContentsCetCompat Boolean | — |
ShadowStackOverflowReset Boolean | — |
ErrorCode UInt32 | — |
Event ID 34 — The system has encountered a kernel-mode shadow stack return address mismatch.
Description
The system has encountered a kernel-mode shadow stack return address mismatch. The system will be terminated.
Message #
Fields #
| Name | Description |
|---|---|
Instruction_address | — |
module_offset | — |
Instruction_address | — |
module_offset | — |
ControlPcImageNameLength UInt16 | — |
ControlPcImageName UnicodeString | — |
RspContentsImageNameLength UInt16 | — |
RspContentsImageName UnicodeString | — |
NonenforcementReason UInt32 | — |
ControlPcAddress Pointer | — |
ControlPcOffset Pointer | — |
ControlPcCetCompat Boolean | — |
RspContentsAddress Pointer | — |
RspContentsOffset Pointer | — |
RspContentsCetCompat Boolean | — |
ShadowStackOverflowReset Boolean | — |
ErrorCode UInt32 | — |
Event ID 35 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making the NtFsControlFile system call.
Description
Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making the NtFsControlFile system call.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |
Event ID 36 — Process 'ProcessPath' (PID CallingProcessId) was blocked from making the NtFsControlFile system call.
Description
Process 'ProcessPath' (PID CallingProcessId) was blocked from making the NtFsControlFile system call.
Message #
Fields #
| Name | Description |
|---|---|
ProcessPathLength UInt16 | — |
ProcessPath UnicodeString | — |
ProcessCommandLineLength UInt16 | — |
ProcessCommandLine UnicodeString | — |
CallingProcessId UInt32 | — |
CallingProcessCreateTime FILETIME | — |
CallingProcessStartKey UInt64 | — |
CallingProcessSignatureLevel UInt8 | — |
CallingProcessSectionSignatureLevel UInt8 | — |
CallingProcessProtection UInt8 | — |
CallingThreadId UInt32 | — |
CallingThreadCreateTime FILETIME | — |