Windows freezing?

Associate
Joined
21 Nov 2011
Posts
73
Location
Liverpool
Hey guys, recently I've been having a few system freeze ups which I can't link to anything in particular. After several hours of playing games or even just browsing the web for 20 mins my screen will freeze, my PC is still running and everything turned on but the screen is frozen and I have to hold the power button down and restart. When it freezes my peripherals are still on but pressing the Caps Lock or Num Lock keys doesn't turn the lights on or off on my keyboard.

I did a tonne of hardware diagnosis recently (MemTest86, Prime95, Furmark) so I'm beginning to think it's a Windows freeze up but don't know the best way to diagnose the problem?

I've got Windows 7 64bit SP1 installed on my SSD.
 
might be worth trying to check windows files to make sure they are not corrupt.

open command prompt as a admin and type

sfc /scannow

it will say at the end if there is any issues with any files and if they can be fixed or not.

other than that is there anything in event viewer to help find the issue? is the SSD on the latest version of the firmware?
 
Sorry for the late reply. I ran sfc /scannow and got a "Found but could not fix some Corrupt files" message after the scan had finished. I attempted to read the CSB.log file it produces but couldn't decipher/pick out anything relevant, anything specific I should be looking for?

I just updated my SSD to the latest Firmware so fingers crossed...

I've looked in Event Viewer a few times but can't really see anything that stands out to me, mainly because I'm not sure what I'm looking for... I think the freeze happened around 07/04/2015 22:30:21 so I created a custom view in Event Viewer +- 10 mins or so either side of when I think it crashed, there are a few events around 'Critical 07/04/2015 22:30:21' but not sure if they would cause a freeze up or not?

If you Ctrl + F and search for 'Critical 07/04/2015 22:30:21' it will take you to that event; if anyone can spot anything that's glaringly bad it would be a great help!

Code:
Level	Date and Time	Source	Event ID	Task Category
Information	07/04/2015 22:42:30	Microsoft-Windows-Kernel-General	13	None	The operating system is shutting down at system time ‎2015‎-‎04‎-‎07T21:42:30.558836200Z.
Information	07/04/2015 22:42:30	Microsoft-Windows-Kernel-Power	109	(103)	The kernel power manager has initiated a shutdown transition.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Plug and Play service entered the stopped state.
Information	07/04/2015 22:42:29	Microsoft-Windows-UserPnp	20010	(7010)	"One or more of the Plug and Play service's subsystems has changed state. 

PlugPlay install subsystem enabled: 'false' 
PlugPlay caching subsystem enabled: 'false' 
"
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Search service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Image Acquisition (WIA) service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Function Discovery Resource Publication service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Cryptographic Services service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Modules Installer service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Security Center service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The SSDP Discovery service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Management Instrumentation service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Desktop Window Manager Session Manager service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Distributed Link Tracking Client service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Font Cache Service service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The UPnP Device Host service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Peer Name Resolution Protocol service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The User Profile Service service entered the stopped state.
Information	07/04/2015 22:42:29	Microsoft-Windows-User Profiles Service	1532	None	"The User Profile Service has stopped.  

"
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Windows Event Log service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Power service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The PnkBstrA service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Peer Networking Identity Manager service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Disk Defragmenter service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The DHCP Client service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Diagnostic Service Host service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Human Interface Device Access service entered the stopped state.
Information	07/04/2015 22:42:29	Microsoft-Windows-Dhcp-Client	50037	Service State Event	DHCPv4 client service is stopped. ShutDown Flag value is 1
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Diagnostic Policy Service service entered the stopped state.
Information	07/04/2015 22:42:29	Microsoft-Windows-DHCPv6-Client	51047	Service State Event	DHCPv6 client service is stopped. ShutDown Flag value is 1
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Diagnostic System Host service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Microsoft Office ClickToRun Service service entered the stopped state.
Information	07/04/2015 22:42:29	Microsoft-Windows-Eventlog	1100	Service shutdown	The event logging service has shut down.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Bonjour Service service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The AMD External Events Utility service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X64 service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X86 service entered the stopped state.
Information	07/04/2015 22:42:29	Service Control Manager	7036	None	The AMD FUEL Service service entered the stopped state.
Information	07/04/2015 22:42:28	Service Control Manager	7036	None	The Group Policy Client service entered the stopped state.
Information	07/04/2015 22:42:28	Service Control Manager	7036	None	The Windows Update service entered the stopped state.
Information	07/04/2015 22:42:28	Microsoft-Windows-WindowsUpdateClient	27	Windows Update Agent	Automatic Updates is now paused.
Information	07/04/2015 22:42:28	Service Control Manager	7036	None	The Windows Modules Installer service entered the running state.
Information	07/04/2015 22:42:29	EventLog	6006	None	The Event log service was stopped.
Information	07/04/2015 22:42:29	Bonjour Service	100	None	Service stopped (0)

Information	07/04/2015 22:42:28	Service Control Manager	7036	None	The Windows Media Player Network Sharing Service service entered the stopped state.
Information	07/04/2015 22:42:28	Service Control Manager	7036	None	The UPnP Device Host service entered the running state.
Information	07/04/2015 22:42:28	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:42:28	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:42:28	Microsoft-Windows-Winlogon	7002	(1102)	User Logoff Notification for Customer Experience Improvement Program
Information	07/04/2015 22:42:28	Microsoft-Windows-Security-Auditing	4647	Logoff	"User initiated logoff:

Subject:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x35737

This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event."
Information	07/04/2015 22:42:28	Microsoft-Windows-WMPNSS-Service	14205	None	Service 'WMPNetworkSvc' stopped.
Information	07/04/2015 22:42:28	USER32	1074	None	"The process C:\Windows\system32\winlogon.exe (STE-PC) has initiated the power off of computer STE-PC on behalf of user Ste-PC\Ste for the following reason: No title for this reason could be found
 Reason Code: 0x500ff
 Shutdown Type: power off
 Comment: "
Information	07/04/2015 22:42:28	Microsoft-Windows-Winlogon	6000	None	The winlogon notification subscriber <SessionEnv> was unavailable to handle a notification event.
Information	07/04/2015 22:42:28	Desktop Window Manager	9009	None	The Desktop Window Manager has exited with code (0x40010004)
Information	07/04/2015 22:42:25	USER32	1074	None	"The process Explorer.EXE has initiated the power off of computer STE-PC on behalf of user Ste-PC\Ste for the following reason: Other (Unplanned)
 Reason Code: 0x0
 Shutdown Type: power off
 Comment: "
Information	07/04/2015 22:39:24	Service Control Manager	7036	None	The WMI Performance Adapter service entered the stopped state.
Information	07/04/2015 22:39:24	Microsoft-Windows-LoadPerf	1000	None	Performance counters for the WmiApRpl (WmiApRpl) service were loaded successfully. The Record Data in the data section contains the new index values assigned to this service.
Information	07/04/2015 22:39:24	Microsoft-Windows-LoadPerf	1001	None	Performance counters for the WmiApRpl (WmiApRpl) service were removed successfully. The Record Data contains the new values of the system Last Counter and Last Help registry entries.
Information	07/04/2015 22:38:47	Service Control Manager	7036	None	The Disk Defragmenter service entered the running state.
Information	07/04/2015 22:38:46	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:38:46	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Error	07/04/2015 22:35:02	MouseKeyboardCenter	0	None	"Unknown Node:#text	-->
  "
Information	07/04/2015 22:33:25	Service Control Manager	7036	None	The WMI Performance Adapter service entered the running state.
Information	07/04/2015 22:33:25	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:33:25	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:33:24	Service Control Manager	7036	None	The WMI Performance Adapter service entered the stopped state.
Information	07/04/2015 22:32:37	Service Control Manager	7036	None	The Security Center service entered the running state.
Information	07/04/2015 22:32:37	Service Control Manager	7036	None	The Google Update Service (gupdate) service entered the stopped state.
Information	07/04/2015 22:32:37	Service Control Manager	7036	None	The Google Update Service (gupdate) service entered the running state.
Information	07/04/2015 22:32:37	SecurityCenter	1	None	The Windows Security Center Service has started.
Information	07/04/2015 22:32:37	gupdate	0	None	"The description for Event ID 0 from source gupdate cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event: 

Service stopped
"
Information	07/04/2015 22:32:36	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X64 service entered the running state.
Information	07/04/2015 22:32:36	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X86 service entered the running state.
Information	07/04/2015 22:32:36	Service Control Manager	7036	None	The Portable Device Enumerator Service service entered the stopped state.
Information	07/04/2015 22:32:36	Service Control Manager	7036	None	The Background Intelligent Transfer Service service entered the running state.
Information	07/04/2015 22:31:44	Microsoft-Windows-Application-Experience	206	None	The Program Compatibility Assistant service successfully performed phase two initialization.
Information	07/04/2015 22:31:20	Service Control Manager	7036	None	The WMI Performance Adapter service entered the running state.
Information	07/04/2015 22:31:20	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:31:20	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:31:19	Service Control Manager	7045	None	"A service was installed in the system.

Service Name:  speccy
Service File Name:  C:\Users\Ste\AppData\Local\Temp\27d451b5-4558-4294-89d1-4a613ba21b73
Service Type:  kernel mode driver
Service Start Type:  demand start
Service Account:  "
Information	07/04/2015 22:31:19	Service Control Manager	7036	None	The Windows Update service entered the running state.
Information	07/04/2015 22:31:17	Service Control Manager	7036	None	The Peer Name Resolution Protocol service entered the running state.
Information	07/04/2015 22:31:17	Service Control Manager	7036	None	The Peer Networking Identity Manager service entered the running state.
Information	07/04/2015 22:31:17	Service Control Manager	7045	None	"A service was installed in the system.

Service Name:  cpuz138
Service File Name:  C:\Users\Ste\AppData\Local\Temp\\cpuz138\cpuz138_x64.sys
Service Type:  kernel mode driver
Service Start Type:  demand start
Service Account:  "
Information	07/04/2015 22:30:52	Service Control Manager	7036	None	The AODService service entered the stopped state.
Information	07/04/2015 22:30:48	Service Control Manager	7036	None	The Computer Browser service entered the stopped state.
Information	07/04/2015 22:30:38	Service Control Manager	7036	None	The Windows Font Cache Service service entered the running state.
Information	07/04/2015 22:30:37	Service Control Manager	7036	None	The SSDP Discovery service entered the running state.
Information	07/04/2015 22:30:37	Service Control Manager	7036	None	The Computer Browser service entered the running state.
Information	07/04/2015 22:30:37	Service Control Manager	7036	None	The Application Experience service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The HomeGroup Provider service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Function Discovery Provider Host service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Windows Media Player Network Sharing Service service entered the running state.
Information	07/04/2015 22:30:36	Microsoft-Windows-WMPNSS-Service	14204	None	Service 'WMPNetworkSvc' started.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Windows Search service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Portable Device Enumerator Service service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Diagnostic System Host service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Network List Service service entered the running state.
Information	07/04/2015 22:30:36	Service Control Manager	7036	None	The Human Interface Device Access service entered the running state.
Information	07/04/2015 22:30:36	Microsoft-Windows-WMI	5617	None	Windows Management Instrumentation Service subsystems initialized successfully
Information	07/04/2015 22:30:36	Microsoft-Windows-Search	1003	Search service	The Windows Search Service started.

Information	07/04/2015 22:30:36	ESENT	302	Logging/Recovery	Windows (3088) Windows: The database engine has successfully completed recovery steps.
Information	07/04/2015 22:30:36	ESENT	301	Logging/Recovery	Windows (3088) Windows: The database engine has begun replaying logfile C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log.
Information	07/04/2015 22:30:36	ESENT	300	Logging/Recovery	Windows (3088) Windows: The database engine is initiating recovery steps.
Information	07/04/2015 22:30:36	ESENT	102	General	Windows (3088) Windows: The database engine (6.01.7601.0000) started a new instance (0).
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Network Connections service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Diagnostic Service Host service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The WinHTTP Web Proxy Auto-Discovery Service service entered the running state.
Information	07/04/2015 22:30:35	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:35	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Server service entered the running state.
Information	07/04/2015 22:30:35	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:			3

New Logon:
	Security ID:		ANONYMOUS LOGON
	Account Name:		ANONYMOUS LOGON
	Account Domain:		NT AUTHORITY
	Logon ID:		0x70000
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x0
	Process Name:		-

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V1
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Warning	07/04/2015 22:30:35	Microsoft-Windows-Wininit	11	None	Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The IP Helper service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Windows Live ID Sign-in Assistant service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Function Discovery Resource Publication service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Windows Image Acquisition (WIA) service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Windows Management Instrumentation service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Distributed Link Tracking Client service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The PnkBstrA service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Microsoft Office ClickToRun Service service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Network Location Awareness service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Program Compatibility Assistant Service service entered the running state.
Information	07/04/2015 22:30:35	Microsoft-Windows-Application-Experience	201	None	The Program Compatibility Assistant service started successfully.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Diagnostic Policy Service service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Bonjour Service service entered the running state.
Information	07/04/2015 22:30:35	Service Control Manager	7036	None	The Apple Mobile Device service entered the running state.
Information	07/04/2015 22:30:35	Microsoft-Windows-WMI	5611	None	The Windows Management Instrumentation service has detected an inconsistent system shutdown.
Information	07/04/2015 22:30:35	Microsoft-Windows-WMI	5615	None	Windows Management Instrumentation Service started sucessfully
Information	07/04/2015 22:30:35	Bonjour Service	100	None	Service started

Information	07/04/2015 22:30:35	Bonjour Service	100	None	Service initialized
Information	07/04/2015 22:30:35	Bonjour Service	100	None	Service initializing
Information	07/04/2015 22:30:34	Service Control Manager	7036	None	The AODService service entered the running state.
Information	07/04/2015 22:30:29	Service Control Manager	7036	None	The AMD FUEL Service service entered the running state.
Information	07/04/2015 22:30:28	Service Control Manager	7036	None	The ACP User Service service entered the running state.
Information	07/04/2015 22:30:28	Service Control Manager	7036	None	The AMD FUEL Service service entered the running state.
Information	07/04/2015 22:30:28	Microsoft-Windows-Security-Auditing	5024	Other System Events	The Windows Firewall service started successfully.
Information	07/04/2015 22:30:28	Service Control Manager	7036	None	The Workstation service entered the running state.
Information	07/04/2015 22:30:28	Service Control Manager	7036	None	The Windows Firewall service entered the running state.
Information	07/04/2015 22:30:28	Service Control Manager	7036	None	The Base Filtering Engine service entered the running state.
Information	07/04/2015 22:30:28	Microsoft-Windows-Security-Auditing	5033	Other System Events	The Windows Firewall Driver started successfully.
Information	07/04/2015 22:30:27	Microsoft-Windows-User Profiles Service	1531	None	"The User Profile Service has started successfully.  

"
Information	07/04/2015 22:30:28	Microsoft-Windows-Winlogon	6000	None	The winlogon notification subscriber <SessionEnv> was unavailable to handle a notification event.
Information	07/04/2015 22:30:28	Microsoft-Windows-Winlogon	4101	None	Windows license validated.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Print Spooler service entered the running state.
Information	07/04/2015 22:30:27	Microsoft-Windows-Winlogon	7001	(1101)	User Logon Notification for Customer Experience Improvement Program
Information	07/04/2015 22:30:27	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x35737

Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:27	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			2

New Logon:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x35737
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x270
	Process Name:		C:\Windows\System32\winlogon.exe

Network Information:
	Workstation Name:	STE-PC
	Source Network Address:	127.0.0.1
	Source Port:		0

Detailed Authentication Information:
	Logon Process:		User32 
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:27	Microsoft-Windows-Security-Auditing	4648	Logon	"A logon was attempted using explicit credentials.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost

Process Information:
	Process ID:		0x270
	Process Name:		C:\Windows\System32\winlogon.exe

Network Information:
	Network Address:	127.0.0.1
	Port:			0

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."
Information	07/04/2015 22:30:27	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:27	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Task Scheduler service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Shell Hardware Detection service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The DNS Client service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The DHCP Client service entered the running state.
Information	07/04/2015 22:30:27	Microsoft-Windows-DHCPv6-Client	51046	Service State Event	DHCPv6 client service is started
Information	07/04/2015 22:30:27	Microsoft-Windows-Dhcp-Client	50036	Service State Event	DHCPv4 client service is started
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The TCP/IP NetBIOS Helper service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Network Store Interface Service service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Security Accounts Manager service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Desktop Window Manager Session Manager service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The System Event Notification Service service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The COM+ Event System service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Offline Files service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The User Profile Service service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Group Policy Client service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Themes service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Creative Audio Service service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Windows Audio service entered the running state.
Information	07/04/2015 22:30:27	Service Control Manager	7036	None	The Windows Audio Endpoint Builder service entered the running state.
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4624	Logon	"The description for Event ID 4624 from source Microsoft-Windows-Security-Auditing cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event: 

EV_RenderedValue_0.00
STE-PC$
WORKGROUP
999
EV_RenderedValue_4.00
SYSTEM
NT AUTHORITY
999
5
Advapi  
Negotiate
EV_RenderedValue_12.00
-
-
0
592
C:\Windows\System32\services.exe
-
-

The handle is invalid
"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		LOCAL SERVICE
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e5

Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		LOCAL SERVICE
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e5
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		NETWORK SERVICE
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e4

Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		NETWORK SERVICE
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:30:26	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:25	Microsoft-Windows-Security-Auditing	4902	Audit Policy Change	"The Per-user audit policy table was created.

Number of Elements:	0
Policy ID:	0xe456"
Information	07/04/2015 22:30:25	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:			0

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x4
	Process Name:		

Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		-
	Authentication Package:	-
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:30:25	Microsoft-Windows-Security-Auditing	4608	Security State Change	"Windows is starting up.

This event is logged when LSASS.EXE starts and the auditing subsystem is initialized."
Error	07/04/2015 22:30:27	Microsoft-Windows-Eventlog	1101	Event processing	Audit events have been dropped by the transport.  0
Information	07/04/2015 22:30:27	Microsoft-Windows-EventSystem	4625	None	The EventSystem sub system is suppressing duplicate event log entries for a duration of 86400 seconds.  The suppression timeout can be controlled by a REG_DWORD value named SuppressDuplicateDuration under the following registry key: HKLM\Software\Microsoft\EventSystem\EventLog.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Multimedia Class Scheduler service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Windows Event Log service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The AMD External Events Utility service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Cryptographic Services service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The COMODO Internet Security Helper Service service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Remote Procedure Call (RPC) service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The RPC Endpoint Mapper service entered the running state.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The DCOM Server Process Launcher service entered the running state.
Information	07/04/2015 22:30:26	Microsoft-Windows-FilterManager	6	None	File System Filter 'luafv' (6.1, ‎2009‎-‎07‎-‎14T00:26:13.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Power service entered the running state.
Information	07/04/2015 22:30:26	Microsoft-Windows-UserPnp	20010	(7010)	"One or more of the Plug and Play service's subsystems has changed state. 

PlugPlay install subsystem enabled: 'true' 
PlugPlay caching subsystem enabled: 'true' 
"
Information	07/04/2015 22:30:26	Service Control Manager	7036	None	The Plug and Play service entered the running state.
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 5 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 4 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 3 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 2 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 1 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:22	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 0 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:30:26	EventLog	6013	None	The system uptime is 12 seconds.
Information	07/04/2015 22:30:26	EventLog	6005	None	The Event log service was started.
Information	07/04/2015 22:30:26	EventLog	6009	None	Microsoft (R) Windows (R) 6.01. 7601 Service Pack 1 Multiprocessor Free.
Error	07/04/2015 22:30:26	EventLog	6008	None	The previous system shutdown at 22:23:59 on ‎07/‎04/‎2015 was unexpected.
Critical	07/04/2015 22:30:21	Microsoft-Windows-Kernel-Power	41	(63)	The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.
Information	07/04/2015 22:30:21	Microsoft-Windows-FilterManager	6	None	File System Filter 'cmdGuard' (6.1, ‎2015‎-‎01‎-‎30T12:47:15.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:30:14	Microsoft-Windows-FilterManager	6	None	File System Filter 'FileInfo' (6.1, ‎2009‎-‎07‎-‎14T00:34:25.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:30:14	Microsoft-Windows-Kernel-General	12	None	The operating system started at system time ‎2015‎-‎04‎-‎07T21:30:13.860398900Z.
Information	07/04/2015 22:23:09	Service Control Manager	7036	None	The Security Center service entered the running state.
Information	07/04/2015 22:23:09	Service Control Manager	7036	None	The Google Update Service (gupdate) service entered the stopped state.
Information	07/04/2015 22:23:09	Service Control Manager	7036	None	The Google Update Service (gupdate) service entered the running state.
Information	07/04/2015 22:23:09	SecurityCenter	1	None	The Windows Security Center Service has started.
Information	07/04/2015 22:23:09	gupdate	0	None	"The description for Event ID 0 from source gupdate cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event: 

Service stopped
"
Information	07/04/2015 22:23:08	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X64 service entered the running state.
Information	07/04/2015 22:23:07	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X86 service entered the running state.
Information	07/04/2015 22:23:07	Service Control Manager	7036	None	The Portable Device Enumerator Service service entered the stopped state.
Information	07/04/2015 22:23:07	Service Control Manager	7036	None	The Background Intelligent Transfer Service service entered the running state.
Information	07/04/2015 22:22:30	Service Control Manager	7036	None	The WMI Performance Adapter service entered the running state.
Information	07/04/2015 22:22:30	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:22:30	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:22:29	Service Control Manager	7045	None	"A service was installed in the system.

Service Name:  speccy
Service File Name:  C:\Users\Ste\AppData\Local\Temp\1f33f957-617f-4942-b7c3-9f5271f42717
Service Type:  kernel mode driver
Service Start Type:  demand start
Service Account:  "
Information	07/04/2015 22:22:29	Service Control Manager	7036	None	The Windows Update service entered the running state.
Information	07/04/2015 22:22:27	Service Control Manager	7036	None	The Peer Name Resolution Protocol service entered the running state.
Information	07/04/2015 22:22:27	Service Control Manager	7036	None	The Peer Networking Identity Manager service entered the running state.
Information	07/04/2015 22:21:27	Service Control Manager	7036	None	The AODService service entered the stopped state.
Information	07/04/2015 22:21:19	Service Control Manager	7036	None	The Computer Browser service entered the stopped state.
Information	07/04/2015 22:21:10	Service Control Manager	7036	None	The Windows Font Cache Service service entered the running state.
Information	07/04/2015 22:21:09	Service Control Manager	7036	None	The SSDP Discovery service entered the running state.
Information	07/04/2015 22:21:09	Service Control Manager	7036	None	The HomeGroup Provider service entered the running state.
Information	07/04/2015 22:21:09	Service Control Manager	7036	None	The Function Discovery Provider Host service entered the running state.
Information	07/04/2015 22:21:08	Service Control Manager	7036	None	The Windows Media Player Network Sharing Service service entered the running state.
Information	07/04/2015 22:21:08	Service Control Manager	7036	None	The Computer Browser service entered the running state.
Information	07/04/2015 22:21:08	Service Control Manager	7036	None	The Application Experience service entered the running state.
Information	07/04/2015 22:21:08	Microsoft-Windows-WMPNSS-Service	14204	None	Service 'WMPNetworkSvc' started.
Information	07/04/2015 22:21:08	Service Control Manager	7036	None	The Network Connections service entered the running state.
Warning	07/04/2015 22:21:08	Microsoft-Windows-Wininit	11	None	Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of libraries to ensure they are related to trusted applications.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The AMD FUEL Service service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Windows Search service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Portable Device Enumerator Service service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Network List Service service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The WinHTTP Web Proxy Auto-Discovery Service service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Diagnostic System Host service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Human Interface Device Access service entered the running state.
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Diagnostic Service Host service entered the running state.
Information	07/04/2015 22:21:07	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:21:07	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:21:07	Service Control Manager	7036	None	The Server service entered the running state.
Information	07/04/2015 22:21:07	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:			3

New Logon:
	Security ID:		ANONYMOUS LOGON
	Account Name:		ANONYMOUS LOGON
	Account Domain:		NT AUTHORITY
	Logon ID:		0x6df0e
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x0
	Process Name:		-

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		NtLmSsp 
	Authentication Package:	NTLM
	Transited Services:	-
	Package Name (NTLM only):	NTLM V1
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:21:07	Microsoft-Windows-Search	1003	Search service	The Windows Search Service started.

Information	07/04/2015 22:21:07	ESENT	302	Logging/Recovery	Windows (3080) Windows: The database engine has successfully completed recovery steps.
Information	07/04/2015 22:21:07	ESENT	301	Logging/Recovery	Windows (3080) Windows: The database engine has begun replaying logfile C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log.
Information	07/04/2015 22:21:07	ESENT	301	Logging/Recovery	Windows (3080) Windows: The database engine has begun replaying logfile C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS00285.log.
Information	07/04/2015 22:21:07	ESENT	301	Logging/Recovery	Windows (3080) Windows: The database engine has begun replaying logfile C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS00284.log.
Information	07/04/2015 22:21:07	ESENT	301	Logging/Recovery	Windows (3080) Windows: The database engine has begun replaying logfile C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS00283.log.
Information	07/04/2015 22:21:07	ESENT	300	Logging/Recovery	Windows (3080) Windows: The database engine is initiating recovery steps.
Information	07/04/2015 22:21:07	ESENT	102	General	Windows (3080) Windows: The database engine (6.01.7601.0000) started a new instance (0).
Information	07/04/2015 22:21:07	Microsoft-Windows-WMI	5617	None	Windows Management Instrumentation Service subsystems initialized successfully
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The IP Helper service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Windows Live ID Sign-in Assistant service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Windows Image Acquisition (WIA) service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Windows Management Instrumentation service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Distributed Link Tracking Client service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Function Discovery Resource Publication service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The PnkBstrA service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Microsoft Office ClickToRun Service service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Network Location Awareness service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Program Compatibility Assistant Service service entered the running state.
Information	07/04/2015 22:21:06	Microsoft-Windows-Application-Experience	201	None	The Program Compatibility Assistant service started successfully.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Diagnostic Policy Service service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Bonjour Service service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The Apple Mobile Device service entered the running state.
Information	07/04/2015 22:21:06	Service Control Manager	7036	None	The AODService service entered the running state.
Information	07/04/2015 22:21:06	Microsoft-Windows-WMI	5615	None	Windows Management Instrumentation Service started sucessfully
Information	07/04/2015 22:21:06	Bonjour Service	100	None	Service started

Information	07/04/2015 22:21:06	Bonjour Service	100	None	Service initialized
Information	07/04/2015 22:21:06	Bonjour Service	100	None	Service initializing
Information	07/04/2015 22:21:01	Service Control Manager	7036	None	The ACP User Service service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The AMD FUEL Service service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	5024	Other System Events	The Windows Firewall service started successfully.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Workstation service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Windows Firewall service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	5033	Other System Events	The Windows Firewall Driver started successfully.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Base Filtering Engine service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Print Spooler service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-Winlogon	7001	(1101)	User Logon Notification for Customer Experience Improvement Program
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x35702

Privileges:		SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			2

New Logon:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x35702
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x270
	Process Name:		C:\Windows\System32\winlogon.exe

Network Information:
	Workstation Name:	STE-PC
	Source Network Address:	127.0.0.1
	Source Port:		0

Detailed Authentication Information:
	Logon Process:		User32 
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	4648	Logon	"A logon was attempted using explicit credentials.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Target Server:
	Target Server Name:	localhost
	Additional Information:	localhost

Process Information:
	Process ID:		0x270
	Process Name:		C:\Windows\System32\winlogon.exe

Network Information:
	Network Address:	127.0.0.1
	Port:			0

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command."
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:21:00	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Task Scheduler service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Shell Hardware Detection service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The DNS Client service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The DHCP Client service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-DHCPv6-Client	51046	Service State Event	DHCPv6 client service is started
Information	07/04/2015 22:21:00	Microsoft-Windows-Dhcp-Client	50036	Service State Event	DHCPv4 client service is started
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The TCP/IP NetBIOS Helper service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Network Store Interface Service service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Security Accounts Manager service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Desktop Window Manager Session Manager service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The System Event Notification Service service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The COM+ Event System service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Offline Files service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The User Profile Service service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Group Policy Client service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-User Profiles Service	1531	None	"The User Profile Service has started successfully.  

"
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Themes service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Creative Audio Service service entered the running state.
Information	07/04/2015 22:21:00	Service Control Manager	7036	None	The Windows Audio service entered the running state.
Information	07/04/2015 22:21:00	Microsoft-Windows-Winlogon	6000	None	The winlogon notification subscriber <SessionEnv> was unavailable to handle a notification event.
Information	07/04/2015 22:21:00	Microsoft-Windows-Winlogon	4101	None	Windows license validated.
Information	07/04/2015 22:21:00	Microsoft-Windows-EventSystem	4625	None	The EventSystem sub system is suppressing duplicate event log entries for a duration of 86400 seconds.  The suppression timeout can be controlled by a REG_DWORD value named SuppressDuplicateDuration under the following registry key: HKLM\Software\Microsoft\EventSystem\EventLog.
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The Windows Audio Endpoint Builder service entered the running state.
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The Multimedia Class Scheduler service entered the running state.
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The Windows Event Log service entered the running state.
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The AMD External Events Utility service entered the running state.
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		LOCAL SERVICE
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e5

Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:20:59	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		LOCAL SERVICE
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e5
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The Cryptographic Services service entered the running state.
Information	07/04/2015 22:20:59	Service Control Manager	7036	None	The COMODO Internet Security Helper Service service entered the running state.
Information	07/04/2015 22:20:58	Service Control Manager	7036	None	The Remote Procedure Call (RPC) service entered the running state.
Information	07/04/2015 22:20:58	Service Control Manager	7036	None	The RPC Endpoint Mapper service entered the running state.
Information	07/04/2015 22:20:58	Service Control Manager	7036	None	The DCOM Server Process Launcher service entered the running state.
Information	07/04/2015 22:20:58	Microsoft-Windows-FilterManager	6	None	File System Filter 'luafv' (6.1, ‎2009‎-‎07‎-‎14T00:26:13.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:20:58	Service Control Manager	7036	None	The Power service entered the running state.
Information	07/04/2015 22:20:58	Microsoft-Windows-UserPnp	20010	(7010)	"One or more of the Plug and Play service's subsystems has changed state. 

PlugPlay install subsystem enabled: 'true' 
PlugPlay caching subsystem enabled: 'true' 
"
Information	07/04/2015 22:20:58	Service Control Manager	7036	None	The Plug and Play service entered the running state.
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 5 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 4 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 3 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 2 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 1 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:55	Microsoft-Windows-Kernel-Processor-Power	26	(4)	"Processor 0 in group 0 exposes the following:

1 idle state(s)
0 performance state(s)
0 throttle state(s)"
Information	07/04/2015 22:20:53	Microsoft-Windows-FilterManager	6	None	File System Filter 'cmdGuard' (6.1, ‎2015‎-‎01‎-‎30T12:47:15.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:20:47	Microsoft-Windows-FilterManager	6	None	File System Filter 'FileInfo' (6.1, ‎2009‎-‎07‎-‎14T00:34:25.000000000Z) has successfully loaded and registered with Filter Manager.
Information	07/04/2015 22:20:47	Microsoft-Windows-Kernel-General	12	None	The operating system started at system time ‎2015‎-‎04‎-‎07T21:20:46.860398900Z.
Information	07/04/2015 22:16:20	Microsoft-Windows-Kernel-General	13	None	The operating system is shutting down at system time ‎2015‎-‎04‎-‎07T21:16:20.232402500Z.
Information	07/04/2015 22:16:19	Microsoft-Windows-Kernel-Power	109	(103)	The kernel power manager has initiated a shutdown transition.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The Windows Search service entered the stopped state.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The SSDP Discovery service entered the stopped state.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The Windows Media Player Network Sharing Service service entered the stopped state.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The Windows Image Acquisition (WIA) service entered the stopped state.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The Software Protection service entered the stopped state.
Information	07/04/2015 22:16:19	Service Control Manager	7036	None	The Function Discovery Resource Publication service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Volume Shadow Copy service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Cryptographic Services service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Security Center service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Modules Installer service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Event Log service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Diagnostic Policy Service service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Management Instrumentation service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Microsoft Software Shadow Copy Provider service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Distributed Link Tracking Client service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Time service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The SPP Notification Service service entered the stopped state.
Information	07/04/2015 22:16:18	Microsoft-Windows-Kernel-General	1	None	The system time has changed to ‎2015‎-‎04‎-‎07T21:16:18.844000000Z from ‎2015‎-‎04‎-‎07T21:16:18.844340700Z.
Information	07/04/2015 22:20:59	EventLog	6013	None	The system uptime is 12 seconds.
Information	07/04/2015 22:20:59	EventLog	6005	None	The Event log service was started.
Information	07/04/2015 22:20:59	EventLog	6009	None	Microsoft (R) Windows (R) 6.01. 7601 Service Pack 1 Multiprocessor Free.
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		NETWORK SERVICE
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e4

Privileges:		SeAssignPrimaryTokenPrivilege
			SeAuditPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		NETWORK SERVICE
	Account Name:		NETWORK SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e4
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4672	Special Logon	"Special privileges assigned to new logon.

Subject:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7

Privileges:		SeAssignPrimaryTokenPrivilege
			SeTcbPrivilege
			SeSecurityPrivilege
			SeTakeOwnershipPrivilege
			SeLoadDriverPrivilege
			SeBackupPrivilege
			SeRestorePrivilege
			SeDebugPrivilege
			SeAuditPrivilege
			SeSystemEnvironmentPrivilege
			SeImpersonatePrivilege"
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		SYSTEM
	Account Name:		STE-PC$
	Account Domain:		WORKGROUP
	Logon ID:		0x3e7

Logon Type:			5

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x250
	Process Name:		C:\Windows\System32\services.exe

Network Information:
	Workstation Name:	
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Advapi  
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4902	Audit Policy Change	"The Per-user audit policy table was created.

Number of Elements:	0
Policy ID:	0xe637"
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4624	Logon	"An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Type:			0

New Logon:
	Security ID:		SYSTEM
	Account Name:		SYSTEM
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e7
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x4
	Process Name:		

Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		-
	Authentication Package:	-
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested."
Information	07/04/2015 22:20:58	Microsoft-Windows-Security-Auditing	4608	Security State Change	"Windows is starting up.

This event is logged when LSASS.EXE starts and the auditing subsystem is initialized."
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Desktop Window Manager Session Manager service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Diagnostic Service Host service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The User Profile Service service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Power service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The PnkBstrA service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Font Cache Service service entered the stopped state.
Information	07/04/2015 22:16:18	Microsoft-Windows-User Profiles Service	1532	None	"The User Profile Service has stopped.  

"
Information	07/04/2015 22:16:18	Microsoft-Windows-Security-Auditing	4616	Security State Change	"The system time was changed.

Subject:
	Security ID:		LOCAL SERVICE
	Account Name:		LOCAL SERVICE
	Account Domain:		NT AUTHORITY
	Logon ID:		0x3e5

Process Information:
	Process ID:	0x480
	Name:		C:\Windows\System32\svchost.exe

Previous Time:		‎2015‎-‎04‎-‎07T21:16:18.844340700Z
New Time:		‎2015‎-‎04‎-‎07T21:16:18.844000000Z

This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer."
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Plug and Play service entered the stopped state.
Information	07/04/2015 22:16:18	Microsoft-Windows-UserPnp	20010	(7010)	"One or more of the Plug and Play service's subsystems has changed state. 

PlugPlay install subsystem enabled: 'false' 
PlugPlay caching subsystem enabled: 'false' 
"
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Human Interface Device Access service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Diagnostic System Host service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The DHCP Client service entered the stopped state.
Information	07/04/2015 22:16:18	Microsoft-Windows-Dhcp-Client	50037	Service State Event	DHCPv4 client service is stopped. ShutDown Flag value is 1
Information	07/04/2015 22:16:18	Microsoft-Windows-DHCPv6-Client	51047	Service State Event	DHCPv6 client service is stopped. ShutDown Flag value is 1
Information	07/04/2015 22:16:18	Microsoft-Windows-Eventlog	1100	Service shutdown	The event logging service has shut down.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Microsoft Office ClickToRun Service service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Bonjour Service service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The AMD External Events Utility service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Installer service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X64 service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Microsoft .NET Framework NGEN v4.0.30319_X86 service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The AMD FUEL Service service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Group Policy Client service entered the stopped state.
Information	07/04/2015 22:16:18	Service Control Manager	7036	None	The Windows Update service entered the stopped state.
Information	07/04/2015 22:16:18	EventLog	6006	None	The Event log service was stopped.
Information	07/04/2015 22:16:18	Microsoft-Windows-WindowsUpdateClient	27	Windows Update Agent	Automatic Updates is now paused.
Information	07/04/2015 22:16:18	Microsoft-Windows-Winlogon	7002	(1102)	User Logoff Notification for Customer Experience Improvement Program
Information	07/04/2015 22:16:18	Bonjour Service	100	None	Service stopped (0)

Warning	07/04/2015 22:16:18	Microsoft-Windows-User Profiles Service	1530	None	"Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.  

 DETAIL - 
 1 user registry handles leaked from \Registry\User\S-1-5-21-3108607207-2367612179-3282689221-1000:
Process 4716 (\Device\HarddiskVolume4\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-3108607207-2367612179-3282689221-1000\Software\Microsoft\Windows\CurrentVersion\Explorer
"
Information	07/04/2015 22:16:18	USER32	1074	None	"The process C:\Windows\system32\winlogon.exe (STE-PC) has initiated the restart of computer STE-PC on behalf of user Ste-PC\Ste for the following reason: No title for this reason could be found
 Reason Code: 0x500ff
 Shutdown Type: restart
 Comment: "
Information	07/04/2015 22:16:18	Microsoft-Windows-Winlogon	6000	None	The winlogon notification subscriber <SessionEnv> was unavailable to handle a notification event.
Information	07/04/2015 22:16:17	Microsoft-Windows-Security-Auditing	4647	Logoff	"User initiated logoff:

Subject:
	Security ID:		Ste-PC\Ste
	Account Name:		Ste
	Account Domain:		Ste-PC
	Logon ID:		0x36195

This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event."
Information	07/04/2015 22:16:17	Desktop Window Manager	9009	None	The Desktop Window Manager has exited with code (0x40010004)
Information	07/04/2015 22:16:11	USER32	1074	None	"The process Explorer.EXE has initiated the restart of computer STE-PC on behalf of user Ste-PC\Ste for the following reason: Other (Unplanned)
 Reason Code: 0x0
 Shutdown Type: restart
 Comment: "

P.S: Sorry for my uselessness, I'm not very clued up on how to diagnose something like this!
 
Back
Top Bottom