DeviceProcessEvents

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index


Process creation and related events

Attribute Value
Category MDE
Basic Logs Eligible ✓ Yes (source)
Supports Transformations ✓ Yes (source)
Ingestion API Supported ✗ No
Azure Monitor Tables Reference View Documentation
Defender XDR Advanced Hunting Schema View Documentation

Contents

Schema (74 columns)

Source: Azure Monitor documentation

Column Name Type Description
_BilledSize real The record size in bytes
_IsBillable string Specifies whether ingesting the data is billable. When _IsBillable isfalseingestion isn't billed to your Azure account
AccountDomain string Domain of the account.
AccountName string User name of the account.
AccountObjectId string Unique identifier for the account in Azure AD.
AccountSid string Security Identifier (SID) of the account.
AccountUpn string User principal name (UPN) of the account.
ActionType string Type of activity that triggered the event.
AdditionalFields dynamic Additional information about the entity or event.
AppGuardContainerId string Identifier for the virtualized container used by Application Guard to isolate browser activity.
CreatedProcessSessionId long Windows session ID of the created process.
DeviceId string Unique identifier for the device in the service.
DeviceName string Fully qualified domain name (FQDN) of the device.
FileName string Name of the file that the recorded action was applied to.
FileSize long Size of the file in bytes.
FolderPath string Folder containing the file that the recorded action was applied to.
InitiatingProcessAccountDomain string Domain of the account that ran the process responsible for the event.
InitiatingProcessAccountName string User name of the account that ran the process responsible for the event.
InitiatingProcessAccountObjectId string Azure AD object ID of the user account that ran the process responsible for the event.
InitiatingProcessAccountSid string Security Identifier (SID) of the account that ran the process responsible for the event.
InitiatingProcessAccountUpn string User principal name (UPN) of the account that ran the process responsible for the event.
InitiatingProcessCommandLine string Command line used to run the process that initiated the event.
InitiatingProcessCreationTime datetime Date and time when the process that initiated the event was started.
InitiatingProcessFileName string Name of the process that initiated the event.
InitiatingProcessFileSize long The size of the file (bytes) that ran the process responsible for the event.
InitiatingProcessFolderPath string Folder containing the process (image file) that initiated the event.
InitiatingProcessId long Process ID (PID) of the process that initiated the event.
InitiatingProcessIntegrityLevel string Integrity level of the process that initiated the event. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet download. These integrity levels influence permissions to resources..
InitiatingProcessLogonId long Identifier for a logon session of the process that initiated the event. This identifier is unique on the same machine only between restarts..
InitiatingProcessMD5 string MD5 hash of the process (image file) that initiated the event.
InitiatingProcessParentCreationTime datetime Date and time when the parent of the process responsible for the event was started.
InitiatingProcessParentFileName string Name of the parent process that spawned the process responsible for the event.
InitiatingProcessParentId long Process ID (PID) of the parent process that spawned the process responsible for the event.
InitiatingProcessRemoteSessionDeviceName string Device name of the remote device from which the initiating process's RDP session was initiated.
InitiatingProcessRemoteSessionIP string IP address of the remote device from which the initiating process's RDP session was initiated.
InitiatingProcessSessionId long Windows session ID of the initiating process.
InitiatingProcessSHA1 string SHA-1 hash of the process (image file) that initiated the event.
InitiatingProcessSHA256 string SHA-256 hash of the process (image file) that initiated the event. In some cases this column may not be populated - please use the InitiatingProcessSHA1 column instead.
InitiatingProcessSignatureStatus string Information about the signature status of the process (image file) that initiated the event.
InitiatingProcessSignerType string Type of file signer of the process (image file) that initiated the event.
InitiatingProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event.
InitiatingProcessUniqueId string Unique identifier of the initiating process; this is equal to the Process Start Key in Windows devices.
InitiatingProcessVersionInfoCompanyName string The company name in version information (image file) responsible for the event.
InitiatingProcessVersionInfoFileDescription string The description in version information (image file) responsible for the event.
InitiatingProcessVersionInfoInternalFileName string The internal file name in version information (image file) responsible for the event.
InitiatingProcessVersionInfoOriginalFileName string The original file name in version information (image file) responsible for the event.
InitiatingProcessVersionInfoProductName string The product name in version information (image file) responsible for the event.
InitiatingProcessVersionInfoProductVersion string The product version in version information (image file) responsible for the event.
IsInitiatingProcessRemoteSession bool Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false).
IsProcessRemoteSession bool Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false).
LogonId long Identifier for a logon session. This identifier is unique on the same machine only between restarts.
MachineGroup string Machine group of the machine. This group is used by role-based access control to determine access to the machine.
MD5 string MD5 hash of the file that the recorded action was applied to.
ProcessCommandLine string Command line used to create the new process.
ProcessCreationTime datetime Date and time the process was created.
ProcessId long Process ID (PID) of the newly created process.
ProcessIntegrityLevel string Integrity level of the newly created process. Windows assigns integrity levels to processes based on certain characteristics, such as if they were launched from an internet downloaded. These integrity levels influence permissions to resources..
ProcessRemoteSessionDeviceName string Device name of the remote device from which the created process's RDP session was initiated.
ProcessRemoteSessionIP string IP address of the remote device from which the created process's RDP session was initiated.
ProcessTokenElevation string Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the newly created process.
ProcessUniqueId string Unique identifier of the process; this is equal to the Process Start Key in Windows devices.
ProcessVersionInfoCompanyName string Company name from the version information of the newly created process.
ProcessVersionInfoFileDescription string Description from the version information of the newly created process.
ProcessVersionInfoInternalFileName string Internal file name from the version information of the newly created process.
ProcessVersionInfoOriginalFileName string Original file name from the version information of the newly created process.
ProcessVersionInfoProductName string Product name from the version information of the newly created process.
ProcessVersionInfoProductVersion string Product version from the version information of the newly created process.
ReportId long Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the ComputerName and EventTime columns..
SHA1 string SHA-1 hash of the file that the recorded action was applied to.
SHA256 string SHA-256 of the file that the recorded action was applied to.
SourceSystem string The type of agent the event was collected by. For example,OpsManagerfor Windows agent, either direct connect or Operations Manager,Linuxfor all Linux agents, orAzurefor Azure Diagnostics
TenantId string The Log Analytics workspace ID
TimeGenerated datetime Date and time the event was recorded by the MDE agent on the endpoint.
Type string The name of the table

Solutions (13)

This table is used by the following solutions:

Connectors (1)

This table is ingested by the following connectors:

Connector Selection Criteria
Microsoft Defender XDR

Content Items Using This Table (362)

Analytic Rules (48)

In solution Attacker Tools Threat Protection Essentials:

Analytic Rule Selection Criteria
Probable AdFind Recon Tool Usage

In solution Dev 0270 Detection and Hunting:

Analytic Rule Selection Criteria
DEV-0270 New User Creation
Dev-0270 Malicious Powershell usage
Dev-0270 Registry IOC - September 2022
Dev-0270 WMIC Discovery

In solution FalconFriday:

Analytic Rule Selection Criteria
Access Token Manipulation - Create Process with Token
DCOM Lateral Movement ActionType != "ListeningConnectionCreated"
Detecting UAC bypass - ChangePK and SLUI registry tampering
Detecting UAC bypass - elevated COM interface
Detecting UAC bypass - modify Windows Store settings
Disable or Modify Windows Defender
Ingress Tool Transfer - Certutil
Match Legitimate Name or Location - 2
Oracle suspicious command execution
Remote Desktop Protocol - SharpRDP ActionType == "LogonSuccess"
Rename System Utilities
SMB/Windows Admin Shares ActionType == "InboundConnectionAccepted"
Suspicious parentprocess relationship - Office child processes.
Trusted Developer Utilities Proxy Execution

In solution Microsoft Defender XDR:

Analytic Rule Selection Criteria
Account Creation
Bitsadmin Activity
Clearing of forensic evidence from event logs using wevtutil
Deletion of data on multiple drives using cipher exe
Detect Suspicious Commands Initiated by Webserver Processes
Disabling Security Services via Registry
Doppelpaymer Stop Services
DopplePaymer Procdump
Execution of software vulnerable to webp buffer overflow of CVE-2023-4863
Java Executing cmd to run Powershell
LSASS Credential Dumping with Procdump
LaZagne Credential Theft
Office Apps Launching Wscipt
Potential Build Process Compromise - MDE
Qakbot Campaign Self Deletion
Qakbot Discovery Activies
Rare Process as a Service
Regsvr32 Rundll32 with Anomalous Parent Process
Shadow Copy Deletions
Stopping multiple processes using taskkill

In solution Zinc Open Source:

Analytic Rule Selection Criteria
Zinc Actor IOCs files - October 2022
[Deprecated] - Zinc Actor IOCs domains hashes IPs and useragent - October 2022

Standalone Content:

Analytic Rule Selection Criteria
Audit policy manipulation using auditpol utility
Dev-0228 File Path Hashes November 2021
Email access via active sync
Identify Mango Sandstorm powershell commands
SUNBURST suspicious SolarWinds child processes
Security Service Registry ACL Modification
Unusual identity creation using exchange powershell

Hunting Queries (307)

In solution Cyware:

Hunting Query Selection Criteria
Detecting Suspicious PowerShell Command Executions

In solution Endpoint Threat Protection Essentials:

Hunting Query Selection Criteria
Backup Deletion
Potential Microsoft Security Services Tampering
Rare Windows Firewall Rule updates using Netsh
Unicode Obfuscation in Command Line

In solution Legacy IOC based Threat Protection:

Hunting Query Selection Criteria
Dev-0056 Command Line Activity November 2021
Dev-0322 Command Line Activity November 2021
Dev-0322 File Drop Activity November 2021
Nylon Typhoon Command Line Activity November 2021
SolarWinds Inventory

In solution Microsoft Defender XDR:

Hunting Query Selection Criteria
Account Creation
Anomalous Payload Delivered from ISO files
Bitsadmin Activity
Check for multiple signs of Ransomware Activity
Clear System Logs
Clearing of forensic evidence from event logs using wevtutil
Credential Harvesting Using LaZagne
DLLHost.exe WMIC domain discovery
Deletion of data on multiple drives using cipher exe
Detect MaiSniper
Detect Malicious use of Msiexec Mimikatz
Detect Suspicious Commands Initiated by Webserver Processes
Detect Suspicious Mshta Usage
Disabling Services via Registry
Doppelpaymer Stop Services
DopplePaymer Procdump
Enumeration of Users & Groups for Lateral Movement
Imminent Ransomware
Java Executing cmd to run Powershell
Judgement Panda Exfil Activity
LaZagne Credential Theft
MITRE - Suspicious Events
Malicious Use of MSBuild as LOLBin
Office Apps Launching Wscipt
Possible Teams phishing activity
PowerShell Downloads
PowerShell adding exclusion path for Microsoft Defender of ProgramData
Qakbot Campaign Self Deletion
Qakbot Discovery Activies
Qakbot Reconnaissance Activities
Rare Process as a Service
Regsvr32 Rundll32 with Anomalous Parent Process
Shadow Copy Deletions
Spoolsv Spawning Rundll32
Stopping multiple processes using taskkill
Suspicious Tomcat Confluence Process Launch
Turning off services using sc exe
Webserver Executing Suspicious Applications

In solution MicrosoftDefenderForEndpoint:

Hunting Query Selection Criteria
Probable AdFind Recon Tool Usage

Standalone Content:

Hunting Query Selection Criteria
List all the VScode Extensions which are installed on a user system
MDE_FindsPowerShellExecutionEvents
SUNBURST suspicious SolarWinds child processes

GitHub Only:

Hunting Query Selection Criteria
7-zip-prep-for-exfiltration
APT Baby Shark
APT29 thinktanks
Abuse.ch Recent Threat Feed
Abuse.ch Recent Threat Feed (1)
Accessibility Features
Add malicious user to Admins and RDP users group via PowerShell
AppLocker Policy Design Assistant
Backup deletion
Base64 Detector and Decoder
Base64encodePEFile
Baseline Comparison ActionType == "PowerShellCommand"
Bear Activity GTR 2019
Bitsadmin Activity
CVE-2021-36934 usage detection
Check for multiple signs of ransomware activity
Clearing of forensic evidence from event logs using wevtutil
Cloud Hopper
Crashing Applications
Create account
Create new user with known DEV-0270 username and password
Critical user management operations followed by disabling of System Restore from admin account
DLLHost.exe WMIC domain discovery
DLLHost.exe file creation via PowerShell
DarkSide
Deletion of data on multiple drives using cipher exe
Detect Encoded Powershell
Detect Malicious use of MSIExec
Disable Controlled Folders
Disabling Services via Registry
Discovering potentially tampered devices [Nobelium]
Discovery for highly-privileged accounts
Dopplepaymer In-Memory Malware Implant
Dragon Fly
Electron-CVE-2018-1000006
Elise backdoor
Email data exfiltration via PowerShell
EmojiHunt
Enumeration of users & groups for lateral movement
Equation Group C2 Communication
Excel Macro Execution
Excel launching anomalous processes
ExecuteBase64DecodedPayload
HostExportingMailboxAndRemovingExport[Solarigate]
Hurricane Panda activity
Identify unusual identity additions related to EUROPIUM
Imminent Ransomware
Inhibit recovery by disabling tools and functionality
Judgement Panda exfil activity
LSASS Credential Dumping with Procdump
LaZagne Credential Theft
LemonDuck-competition-killer
LemonDuck-component-download-structure
LemonDuck-component-names
LemonDuck-defender-exclusions
Linux-DynoRoot-CVE-2018-1111
MITRE - Suspicious Events
MacOceanLotusBackdoor
MacOceanLotusDropper
Make FolderPath Vogon Poetry
Malware_In_recyclebin
Masquerading system executable
Mass account password change
Modifying the registry to add a ransom message notification
NTDS theft
PSExec Attrib commands
Password Protected Archive Creation
Possible Ransomware Related Destruction Activity
Possible Teams phishing activity
Possible command injection attempts against Azure Integration Runtimes
PotentialMicrosoftDefenderTampering[Solarigate]
PowerShell adding exclusion path for Microsoft Defender of ProgramData
PowerShell downloads
Qakbot discovery activies
Qakbot reconnaissance activities
Ransomware hits healthcare - Alternate Data Streams use
Ransomware hits healthcare - Cipher.exe tool deleting data
Ransomware hits healthcare - Clearing of system logs
Ransomware hits healthcare - Robbinhood activity
Ransomware hits healthcare - Turning off System Restore
Rare firewall rule changes using netsh
Rare-process-as-a-service
RedMenshen-BPFDoor-backdoor
Remote Management and Monitoring tool - AeroAdmin - Create Process
Remote Management and Monitoring tool - Ammyy - Create Process
Remote Management and Monitoring tool - AnyDesk - Create Process
Remote Management and Monitoring tool - AnyViewer - Create Process
Remote Management and Monitoring tool - Atera - Create Process
Remote Management and Monitoring tool - AweSun - Create Process
Remote Management and Monitoring tool - BarracudaRMM - Create Process
Remote Management and Monitoring tool - BeyondTrust - Create Process
Remote Management and Monitoring tool - ChromeRDP - Create Process
Remote Management and Monitoring tool - ConnectWise - Create Process
Remote Management and Monitoring tool - DameWare - Create Process
Remote Management and Monitoring tool - DesktopNow - Create Process
Remote Management and Monitoring tool - DistantDesktop - Create Process
Remote Management and Monitoring tool - FleetDeck - Create Process
Remote Management and Monitoring tool - GetScreen - Create Process
Remote Management and Monitoring tool - ISLOnline - Create Process
Remote Management and Monitoring tool - IperiusRemote - Create Process
Remote Management and Monitoring tool - Level - Create Process
Remote Management and Monitoring tool - LiteManager - Create Process
Remote Management and Monitoring tool - LogMeIn - Create Process
Remote Management and Monitoring tool - MSP360_CloudBerry - Create Process
Remote Management and Monitoring tool - MeshCentral - Create Process
Remote Management and Monitoring tool - NAble - Create Process
Remote Management and Monitoring tool - Naverisk - Create Process
Remote Management and Monitoring tool - NetSupport - Create Process
Remote Management and Monitoring tool - NinjaRMM - Create Process
Remote Management and Monitoring tool - OptiTune - Create Process
Remote Management and Monitoring tool - PDQ - Create Process
Remote Management and Monitoring tool - Panorama9 - Create Process
Remote Management and Monitoring tool - PcVisit - Create Process
Remote Management and Monitoring tool - Pulseway - Create Process
Remote Management and Monitoring tool - RPort - Create Process
Remote Management and Monitoring tool - RealVNC - Create Process
Remote Management and Monitoring tool - RemoteDesktopPlus - Create Process
Remote Management and Monitoring tool - RemotePC - Create Process
Remote Management and Monitoring tool - RemoteUtilities - Create Process
Remote Management and Monitoring tool - RustDesk - Create Process
Remote Management and Monitoring tool - ScreenMeet - Create Process
Remote Management and Monitoring tool - ServerEye - Create Process
Remote Management and Monitoring tool - ShowMyPC - Create Process
Remote Management and Monitoring tool - SimpleHelp - Create Process
Remote Management and Monitoring tool - Splashtop - Create Process
Remote Management and Monitoring tool - SupRemo - Create Process
Remote Management and Monitoring tool - SyncroMSP - Create Process
Remote Management and Monitoring tool - TacticalRMM - Create Process
Remote Management and Monitoring tool - TeamViewer - Create Process
Remote Management and Monitoring tool - TigerVNC - Create Process
Remote Management and Monitoring tool - TightVNC - Create Process
Remote Management and Monitoring tool - UltraViewer - Create Process
Remote Management and Monitoring tool - XMReality - Create Process
Remote Management and Monitoring tool - ZohoAssist - Create Process
Remote Management and Monitoring tool - mRemoteNG - Create Process
Remote Management and Monitoring tool - parsec.app - Create Process
Remote Management and Montioring tool - Action1 - Create Process
Renamed Rclone Exfil
Shadow Copy Deletions
Spoolsv Spawning Rundll32
Stolen Images Execution
Stopping multiple processes using taskkill
Stopping processes using net stop
StrRAT-AV-Discovery
StrRAT-Malware-Persistence
Suspicious Bitlocker Encryption
Suspicious JScript staging comment
Suspicious PowerShell curl flags
Suspicious Tomcat Confluence Process Launch
Suspicious process event creation from VMWare Horizon TomcatService
SuspiciousEnumerationUsingAdfind[Nobelium]
Turning off System Restore
Turning off services using sc exe
Use of MSBuild as LOLBin
VMWare-LPE-2022-22960
WastedLocker Downloader
Webserver Executing Suspicious Applications
Zip-Doc - Word Launching MSHTA
alt-data-streams
anomalous-payload-delivered-from-iso-file
app-armor-stopped
apt sofacy
apt sofacy zebrocy
apt ta17 293a ps
apt tropictrooper
apt unidentified nov 18
check-for-shadowhammer-activity-implant
clear-system-logs
cobalt-strike-invoked-w-wmi
confluence-weblogic-targeted
cve-2019-0808-set-scheduled-task
cypherpunk-exclusive-commands
cypherpunk-remote-exec-w-psexesvc
deleting-data-w-cipher-tool
detect-anomalous-process-trees
detect-cve-2019-0863-AngryPolarBearBug2-exploit
detect-cve-2019-0973-installerbypass-exploit
detect-cve-2019-1129-byebear-exploit
detect-cyzfc-activity (2)
detect-cyzfc-activity (3)
detect-doublepulsar-execution
detect-exploitation-of-cve-2018-8653
detect-impacket-atexec
detect-impacket-dcomexec ActionType == "InboundConnectionAccepted"
detect-impacket-psexec-module
detect-impacket-wmiexec
detect-impacket-wmiexec
detect-impacket-wmiexec
detect-mailsniper
detect-malicious-rar-extraction
detect-malicious-use-of-msiexec
detect-malicious-use-of-msiexec-mimikatz
detect-malicious-use-of-msiexec-powershell
detect-nbtscan-activity
detect-office-applications-spawning-msdt-CVE-2022-30190
detect-office-products-spawning-wmic
detect-prifou-pua
detect-steganography-exfiltration
detect-suspicious-commands-initiated-by-web-server-processes
detect-suspicious-mshta-usage
detect-uac-elevation
detect-web-server-exploit-doublepulsar
doppelpaymer
doppelpaymer-procdump
doppelpaymer-psexec
doppelpaymer-stop-services
evasive-powershell-executions
evasive-powershell-strings
exchange-powershell-snapin-loaded
hiding-java-class-file
insider-threat-detection-queries (13)
insider-threat-detection-queries (14)
insider-threat-detection-queries (2)
insider-threat-detection-queries (3)
insider-threat-detection-queries (8)
java-executing-cmd-to-run-powershell
jse-launched-by-word
kinsing-miner-download
launch-questd-w-osascript
launching-base64-powershell[Nobelium]
launching-cmd-echo[Nobelium]
lazagne
locate-shlayer-payload-decryption-activity
locate-shlayer-payload-decrytion-activity
locate-surfbuyer-downloader-decoding-activity
oceanlotus-apt32-files
office-apps-launching-wscipt
oracle-webLogic-executing-powershell
powercat-download
powershell-activity-after-email-from-malicious-sender
powershell-version-2.0-execution
procdump-lsass-credentials
python-based-attacks-on-macos
python-use-by-ransomware-macos
qakbot-campaign-esentutl
qakbot-campaign-process-injection
qakbot-campaign-self-deletion
qakbot-campaign-suspicious-javascript
ransom-note-creation-macos
rare_sch_task_with_activity
rce-on-vulnerable-server
regsvr32-rundll32-with-anomalous-parent-process
reverse-shell-nishang
reverse-shell-nishang-base64
reverse-shell-ransomware-macos
robbinhood-evasion
shimcache-flushed
sql-server-abuse
tomcat-8-executing-powershell
turn-off-system-restore
umworkerprocess-unusual-subprocess-activity
wadhrama-data-destruction
wadhrama-ransomware
wdigest-caching
wifikeys

Workbooks (7)

In solution HIPAA Compliance:

Workbook Selection Criteria
HIPAACompliance

In solution Lumen Defender Threat Feed:

Workbook Selection Criteria
Lumen-Threat-Feed-Overview

In solution MaturityModelForEventLogManagementM2131: ActionType in "Add member to role,Add user,InteractiveLogon,RemoteInteractiveLogon,Reset user password,ResourceAccess,Sign-in,Update user"

Workbook
MaturityModelForEventLogManagement_M2131

In solution Microsoft Defender XDR:

Workbook Selection Criteria
MicrosoftDefenderForEndPoint

GitHub Only:

Workbook Selection Criteria
MicrosoftDefenderForEndPoint
MicrosoftSentinelDeploymentandMigrationTracker
SolarWindsPostCompromiseHunting

Parsers Using This Table (1)

ASIM Parsers (1)

Parser Schema Product Selection Criteria
ASimProcessEventMicrosoft365D ProcessEvent Microsoft 365 Defender for endpoint

Selection Criteria Summary (5 criteria, 6 total references)

References by type: 0 connectors, 6 content items, 0 ASIM parsers, 0 other parsers.

Selection Criteria Connectors Content Items ASIM Parsers Other Parsers Total
ActionType == "InboundConnectionAccepted" - 2 - - 2
ActionType != "ListeningConnectionCreated" - 1 - - 1
ActionType == "LogonSuccess" - 1 - - 1
ActionType == "PowerShellCommand" - 1 - - 1
ActionType in "Add member to role,Add user,InteractiveLogon,RemoteInteractiveLogon,Reset user password,ResourceAccess,Sign-in,Update user" - 1 - - 1
Total 0 6 0 0 6

ActionType

Value Connectors Content Items ASIM Parsers Other Parsers Total
InboundConnectionAccepted - 2 - - 2
!= ListeningConnectionCreated - 1 - - 1
LogonSuccess - 1 - - 1
PowerShellCommand - 1 - - 1
Add member to role - 1 - - 1
Add user - 1 - - 1
InteractiveLogon - 1 - - 1
RemoteInteractiveLogon - 1 - - 1
Reset user password - 1 - - 1
ResourceAccess - 1 - - 1
Sign-in - 1 - - 1
Update user - 1 - - 1

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index